id
int32
0
167k
repo
stringlengths
5
54
path
stringlengths
4
155
func_name
stringlengths
1
118
original_string
stringlengths
52
85.5k
language
stringclasses
1 value
code
stringlengths
52
85.5k
code_tokens
listlengths
21
1.41k
docstring
stringlengths
6
2.61k
docstring_tokens
listlengths
3
215
sha
stringlengths
40
40
url
stringlengths
85
252
7,800
contiv/netplugin
netmaster/mastercfg/policyState.go
InitPolicyMgr
func InitPolicyMgr(stateDriver core.StateDriver, ofm *ofnet.OfnetMaster) error { // save statestore and ofnet masters stateStore = stateDriver ofnetMaster = ofm // restore all existing epg policies err := restoreEpgPolicies(stateDriver) if err != nil { log.Errorf("Error restoring EPG policies. ") } return nil }
go
func InitPolicyMgr(stateDriver core.StateDriver, ofm *ofnet.OfnetMaster) error { // save statestore and ofnet masters stateStore = stateDriver ofnetMaster = ofm // restore all existing epg policies err := restoreEpgPolicies(stateDriver) if err != nil { log.Errorf("Error restoring EPG policies. ") } return nil }
[ "func", "InitPolicyMgr", "(", "stateDriver", "core", ".", "StateDriver", ",", "ofm", "*", "ofnet", ".", "OfnetMaster", ")", "error", "{", "// save statestore and ofnet masters", "stateStore", "=", "stateDriver", "\n", "ofnetMaster", "=", "ofm", "\n\n", "// restore a...
// InitPolicyMgr initializes the policy manager
[ "InitPolicyMgr", "initializes", "the", "policy", "manager" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netmaster/mastercfg/policyState.go#L60-L71
7,801
contiv/netplugin
netmaster/mastercfg/policyState.go
NewEpgPolicy
func NewEpgPolicy(epgpKey string, epgID int, policy *contivModel.Policy) (*EpgPolicy, error) { gp := new(EpgPolicy) gp.EpgPolicyKey = epgpKey gp.ID = epgpKey gp.EndpointGroupID = epgID gp.StateDriver = stateStore log.Infof("Creating new epg policy: %s", epgpKey) // init the dbs gp.RuleMaps = make(map[string]*RuleMap) // Install all rules within the policy for ruleKey := range policy.LinkSets.Rules { // find the rule rule := contivModel.FindRule(ruleKey) if rule == nil { log.Errorf("Error finding the rule %s", ruleKey) return nil, core.Errorf("rule not found") } log.Infof("Adding Rule %s to epgp policy %s", ruleKey, epgpKey) // Add the rule to epg Policy err := gp.AddRule(rule) if err != nil { log.Errorf("Error adding rule %s to epg polict %s. Err: %v", ruleKey, epgpKey, err) return nil, err } } // Save the policy state err := gp.Write() if err != nil { return nil, err } // Save it in local cache epgPolicyDb[epgpKey] = gp log.Info("Created epg policy {%+v}", gp) return gp, nil }
go
func NewEpgPolicy(epgpKey string, epgID int, policy *contivModel.Policy) (*EpgPolicy, error) { gp := new(EpgPolicy) gp.EpgPolicyKey = epgpKey gp.ID = epgpKey gp.EndpointGroupID = epgID gp.StateDriver = stateStore log.Infof("Creating new epg policy: %s", epgpKey) // init the dbs gp.RuleMaps = make(map[string]*RuleMap) // Install all rules within the policy for ruleKey := range policy.LinkSets.Rules { // find the rule rule := contivModel.FindRule(ruleKey) if rule == nil { log.Errorf("Error finding the rule %s", ruleKey) return nil, core.Errorf("rule not found") } log.Infof("Adding Rule %s to epgp policy %s", ruleKey, epgpKey) // Add the rule to epg Policy err := gp.AddRule(rule) if err != nil { log.Errorf("Error adding rule %s to epg polict %s. Err: %v", ruleKey, epgpKey, err) return nil, err } } // Save the policy state err := gp.Write() if err != nil { return nil, err } // Save it in local cache epgPolicyDb[epgpKey] = gp log.Info("Created epg policy {%+v}", gp) return gp, nil }
[ "func", "NewEpgPolicy", "(", "epgpKey", "string", ",", "epgID", "int", ",", "policy", "*", "contivModel", ".", "Policy", ")", "(", "*", "EpgPolicy", ",", "error", ")", "{", "gp", ":=", "new", "(", "EpgPolicy", ")", "\n", "gp", ".", "EpgPolicyKey", "=",...
// NewEpgPolicy creates a new policy instance attached to an endpoint group
[ "NewEpgPolicy", "creates", "a", "new", "policy", "instance", "attached", "to", "an", "endpoint", "group" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netmaster/mastercfg/policyState.go#L74-L117
7,802
contiv/netplugin
netmaster/mastercfg/policyState.go
restoreEpgPolicies
func restoreEpgPolicies(stateDriver core.StateDriver) error { // read all epg policies gp := new(EpgPolicy) gp.StateDriver = stateDriver gpCfgs, err := gp.ReadAll() if err == nil { for _, gpCfg := range gpCfgs { epgp := gpCfg.(*EpgPolicy) log.Infof("Restoring EpgPolicy: %+v", epgp) // save it in cache epgPolicyDb[epgp.EpgPolicyKey] = epgp // Restore all rules within the policy for ruleKey, ruleMap := range epgp.RuleMaps { log.Infof("Restoring Rule %s, Rule: %+v", ruleKey, ruleMap.Rule) // delete the entry from the map so that we can add it back delete(epgp.RuleMaps, ruleKey) // Add the rule to epg Policy err := epgp.AddRule(ruleMap.Rule) if err != nil { log.Errorf("Error restoring rule %s. Err: %v", ruleKey, err) return err } } } } return nil }
go
func restoreEpgPolicies(stateDriver core.StateDriver) error { // read all epg policies gp := new(EpgPolicy) gp.StateDriver = stateDriver gpCfgs, err := gp.ReadAll() if err == nil { for _, gpCfg := range gpCfgs { epgp := gpCfg.(*EpgPolicy) log.Infof("Restoring EpgPolicy: %+v", epgp) // save it in cache epgPolicyDb[epgp.EpgPolicyKey] = epgp // Restore all rules within the policy for ruleKey, ruleMap := range epgp.RuleMaps { log.Infof("Restoring Rule %s, Rule: %+v", ruleKey, ruleMap.Rule) // delete the entry from the map so that we can add it back delete(epgp.RuleMaps, ruleKey) // Add the rule to epg Policy err := epgp.AddRule(ruleMap.Rule) if err != nil { log.Errorf("Error restoring rule %s. Err: %v", ruleKey, err) return err } } } } return nil }
[ "func", "restoreEpgPolicies", "(", "stateDriver", "core", ".", "StateDriver", ")", "error", "{", "// read all epg policies", "gp", ":=", "new", "(", "EpgPolicy", ")", "\n", "gp", ".", "StateDriver", "=", "stateDriver", "\n", "gpCfgs", ",", "err", ":=", "gp", ...
// restoreEpgPolicies restores all EPG policies from state store
[ "restoreEpgPolicies", "restores", "all", "EPG", "policies", "from", "state", "store" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netmaster/mastercfg/policyState.go#L120-L151
7,803
contiv/netplugin
netmaster/mastercfg/policyState.go
Delete
func (gp *EpgPolicy) Delete() error { // delete from the DB delete(epgPolicyDb, gp.EpgPolicyKey) return gp.Clear() }
go
func (gp *EpgPolicy) Delete() error { // delete from the DB delete(epgPolicyDb, gp.EpgPolicyKey) return gp.Clear() }
[ "func", "(", "gp", "*", "EpgPolicy", ")", "Delete", "(", ")", "error", "{", "// delete from the DB", "delete", "(", "epgPolicyDb", ",", "gp", ".", "EpgPolicyKey", ")", "\n\n", "return", "gp", ".", "Clear", "(", ")", "\n", "}" ]
// Delete deletes the epg policy
[ "Delete", "deletes", "the", "epg", "policy" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netmaster/mastercfg/policyState.go#L159-L164
7,804
contiv/netplugin
netmaster/mastercfg/policyState.go
AddRule
func (gp *EpgPolicy) AddRule(rule *contivModel.Rule) error { var dirs []string // check if the rule exists already if gp.RuleMaps[rule.Key] != nil { // FIXME: see if we can update the rule return core.Errorf("Rule already exists") } // Figure out all the directional rules we need to install switch rule.Direction { case "in": if (rule.Protocol == "udp" || rule.Protocol == "tcp") && rule.Port != 0 { dirs = []string{"inRx", "inTx"} } else { dirs = []string{"inRx"} } case "out": if (rule.Protocol == "udp" || rule.Protocol == "tcp") && rule.Port != 0 { dirs = []string{"outRx", "outTx"} } else { dirs = []string{"outTx"} } case "both": if (rule.Protocol == "udp" || rule.Protocol == "tcp") && rule.Port != 0 { dirs = []string{"inRx", "inTx", "outRx", "outTx"} } else { dirs = []string{"inRx", "outTx"} } } // create a ruleMap ruleMap := new(RuleMap) ruleMap.OfnetRules = make(map[string]*ofnet.OfnetPolicyRule) ruleMap.Rule = rule // Create ofnet rules for _, dir := range dirs { ofnetRule, err := gp.createOfnetRule(rule, dir) if err != nil { log.Errorf("Error creating %s ofnet rule for {%+v}. Err: %v", dir, rule, err) return err } // add it to the rule map ruleMap.OfnetRules[ofnetRule.RuleId] = ofnetRule } // save the rulemap gp.RuleMaps[rule.Key] = ruleMap return nil }
go
func (gp *EpgPolicy) AddRule(rule *contivModel.Rule) error { var dirs []string // check if the rule exists already if gp.RuleMaps[rule.Key] != nil { // FIXME: see if we can update the rule return core.Errorf("Rule already exists") } // Figure out all the directional rules we need to install switch rule.Direction { case "in": if (rule.Protocol == "udp" || rule.Protocol == "tcp") && rule.Port != 0 { dirs = []string{"inRx", "inTx"} } else { dirs = []string{"inRx"} } case "out": if (rule.Protocol == "udp" || rule.Protocol == "tcp") && rule.Port != 0 { dirs = []string{"outRx", "outTx"} } else { dirs = []string{"outTx"} } case "both": if (rule.Protocol == "udp" || rule.Protocol == "tcp") && rule.Port != 0 { dirs = []string{"inRx", "inTx", "outRx", "outTx"} } else { dirs = []string{"inRx", "outTx"} } } // create a ruleMap ruleMap := new(RuleMap) ruleMap.OfnetRules = make(map[string]*ofnet.OfnetPolicyRule) ruleMap.Rule = rule // Create ofnet rules for _, dir := range dirs { ofnetRule, err := gp.createOfnetRule(rule, dir) if err != nil { log.Errorf("Error creating %s ofnet rule for {%+v}. Err: %v", dir, rule, err) return err } // add it to the rule map ruleMap.OfnetRules[ofnetRule.RuleId] = ofnetRule } // save the rulemap gp.RuleMaps[rule.Key] = ruleMap return nil }
[ "func", "(", "gp", "*", "EpgPolicy", ")", "AddRule", "(", "rule", "*", "contivModel", ".", "Rule", ")", "error", "{", "var", "dirs", "[", "]", "string", "\n\n", "// check if the rule exists already", "if", "gp", ".", "RuleMaps", "[", "rule", ".", "Key", ...
// AddRule adds a rule to epg policy
[ "AddRule", "adds", "a", "rule", "to", "epg", "policy" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netmaster/mastercfg/policyState.go#L315-L368
7,805
contiv/netplugin
netmaster/mastercfg/policyState.go
DelRule
func (gp *EpgPolicy) DelRule(rule *contivModel.Rule) error { // check if the rule exists ruleMap := gp.RuleMaps[rule.Key] if ruleMap == nil { return core.Errorf("Rule does not exists") } // Delete each ofnet rule under this policy rule for _, ofnetRule := range ruleMap.OfnetRules { log.Infof("Deleting rule {%+v} from policyDB", ofnetRule) // Delete the rule from policyDB err := ofnetMaster.DelRule(ofnetRule) if err != nil { log.Errorf("Error deleting the ofnet rule {%+v}. Err: %v", ofnetRule, err) } // Send DelRule to netplugin agents err = delPolicyRuleState(ofnetRule) if err != nil { log.Errorf("Error deleting the ofnet rule {%+v}. Err: %v", ofnetRule, err) } } // delete the cache delete(gp.RuleMaps, rule.Key) return nil }
go
func (gp *EpgPolicy) DelRule(rule *contivModel.Rule) error { // check if the rule exists ruleMap := gp.RuleMaps[rule.Key] if ruleMap == nil { return core.Errorf("Rule does not exists") } // Delete each ofnet rule under this policy rule for _, ofnetRule := range ruleMap.OfnetRules { log.Infof("Deleting rule {%+v} from policyDB", ofnetRule) // Delete the rule from policyDB err := ofnetMaster.DelRule(ofnetRule) if err != nil { log.Errorf("Error deleting the ofnet rule {%+v}. Err: %v", ofnetRule, err) } // Send DelRule to netplugin agents err = delPolicyRuleState(ofnetRule) if err != nil { log.Errorf("Error deleting the ofnet rule {%+v}. Err: %v", ofnetRule, err) } } // delete the cache delete(gp.RuleMaps, rule.Key) return nil }
[ "func", "(", "gp", "*", "EpgPolicy", ")", "DelRule", "(", "rule", "*", "contivModel", ".", "Rule", ")", "error", "{", "// check if the rule exists", "ruleMap", ":=", "gp", ".", "RuleMaps", "[", "rule", ".", "Key", "]", "\n", "if", "ruleMap", "==", "nil",...
// DelRule removes a rule from epg policy
[ "DelRule", "removes", "a", "rule", "from", "epg", "policy" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netmaster/mastercfg/policyState.go#L371-L399
7,806
contiv/netplugin
mgmtfn/mesosplugin/netcontiv/cniplugin.go
parseEnv
func (cniApp *cniAppInfo) parseEnv() error { cniApp.logFields = make(logger.Fields) envVal := "" for _, envName := range cniEnvList { if envVal = os.Getenv(envName); envVal == "" { return fmt.Errorf("failed to get env variable %s", envName) } logger.Infof("parsed env variable %s = [%s]", envName, envVal) switch envName { case envVarCniCommand: cniApp.cniCmd = strings.ToUpper(envVal) cniApp.logFields["CMD"] = envVal if _, ok := map[string]int{cniapi.CniCmdAdd: 1, cniapi.CniCmdDel: 2}[cniApp.cniCmd]; ok == false { return fmt.Errorf("unknown CNI command %s", envName) } case envVarCniIfname: cniApp.cniMesosAttr.CniIfname = envVal case envVarCniNetns: cniApp.cniMesosAttr.CniNetns = envVal nsDir := filepath.Dir(envVal) cniApp.netcfgFile = strings.Join([]string{nsDir, "netcontiv", "network.conf"}, "/") logger.Infof("cni network config file location : %s", cniApp.netcfgFile) case envVarCniContainerID: cniApp.cniMesosAttr.CniContainerid = envVal cniApp.logFields["CID"] = strings.Split(envVal, "-")[0] logger.Debugf("added fields in logger CID: %s", cniApp.logFields["CID"]) default: cniLog.Errorf("unknown CNI variable %s", envName) } } // update logger cniLog = logger.WithFields(cniApp.logFields) return nil }
go
func (cniApp *cniAppInfo) parseEnv() error { cniApp.logFields = make(logger.Fields) envVal := "" for _, envName := range cniEnvList { if envVal = os.Getenv(envName); envVal == "" { return fmt.Errorf("failed to get env variable %s", envName) } logger.Infof("parsed env variable %s = [%s]", envName, envVal) switch envName { case envVarCniCommand: cniApp.cniCmd = strings.ToUpper(envVal) cniApp.logFields["CMD"] = envVal if _, ok := map[string]int{cniapi.CniCmdAdd: 1, cniapi.CniCmdDel: 2}[cniApp.cniCmd]; ok == false { return fmt.Errorf("unknown CNI command %s", envName) } case envVarCniIfname: cniApp.cniMesosAttr.CniIfname = envVal case envVarCniNetns: cniApp.cniMesosAttr.CniNetns = envVal nsDir := filepath.Dir(envVal) cniApp.netcfgFile = strings.Join([]string{nsDir, "netcontiv", "network.conf"}, "/") logger.Infof("cni network config file location : %s", cniApp.netcfgFile) case envVarCniContainerID: cniApp.cniMesosAttr.CniContainerid = envVal cniApp.logFields["CID"] = strings.Split(envVal, "-")[0] logger.Debugf("added fields in logger CID: %s", cniApp.logFields["CID"]) default: cniLog.Errorf("unknown CNI variable %s", envName) } } // update logger cniLog = logger.WithFields(cniApp.logFields) return nil }
[ "func", "(", "cniApp", "*", "cniAppInfo", ")", "parseEnv", "(", ")", "error", "{", "cniApp", ".", "logFields", "=", "make", "(", "logger", ".", "Fields", ")", "\n", "envVal", ":=", "\"", "\"", "\n\n", "for", "_", ",", "envName", ":=", "range", "cniEn...
// parse and save env. variables
[ "parse", "and", "save", "env", ".", "variables" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/mgmtfn/mesosplugin/netcontiv/cniplugin.go#L61-L105
7,807
contiv/netplugin
mgmtfn/mesosplugin/netcontiv/cniplugin.go
parseNwInfoLabels
func (cniApp *cniAppInfo) parseNwInfoLabels() { var cniNetInfo struct { Args struct { Mesos struct { NetworkInfo struct { Labels struct { NwLabel []cniapi.NetworkLabel `json:"labels"` } `json:"labels"` } `json:"network_info"` } `json:"org.apache.mesos"` } `json:"args"` } cniLog.Infof("parse config file %s ", cniApp.netcfgFile) cfgFile, err := ioutil.ReadFile(cniApp.netcfgFile) if err != nil { cniLog.Warnf("%s", err) return } if err := json.Unmarshal(cfgFile, &cniNetInfo); err != nil { cniLog.Errorf("failed to parse %s, %s", cniApp.netcfgFile, err) return } for idx, elem := range cniNetInfo.Args.Mesos.NetworkInfo.Labels.NwLabel { cniLog.Infof("configured labels [%d] {key: %s, val: %s}", idx, elem.Key, elem.Value) // copy netplugin related labels switch elem.Key { case cniapi.LabelTenantName: cniApp.cniMesosAttr.Labels.TenantName = elem.Value case cniapi.LabelNetworkName: cniApp.cniMesosAttr.Labels.NetworkName = elem.Value case cniapi.LabelNetworkGroup: cniApp.cniMesosAttr.Labels.NetworkGroup = elem.Value } } }
go
func (cniApp *cniAppInfo) parseNwInfoLabels() { var cniNetInfo struct { Args struct { Mesos struct { NetworkInfo struct { Labels struct { NwLabel []cniapi.NetworkLabel `json:"labels"` } `json:"labels"` } `json:"network_info"` } `json:"org.apache.mesos"` } `json:"args"` } cniLog.Infof("parse config file %s ", cniApp.netcfgFile) cfgFile, err := ioutil.ReadFile(cniApp.netcfgFile) if err != nil { cniLog.Warnf("%s", err) return } if err := json.Unmarshal(cfgFile, &cniNetInfo); err != nil { cniLog.Errorf("failed to parse %s, %s", cniApp.netcfgFile, err) return } for idx, elem := range cniNetInfo.Args.Mesos.NetworkInfo.Labels.NwLabel { cniLog.Infof("configured labels [%d] {key: %s, val: %s}", idx, elem.Key, elem.Value) // copy netplugin related labels switch elem.Key { case cniapi.LabelTenantName: cniApp.cniMesosAttr.Labels.TenantName = elem.Value case cniapi.LabelNetworkName: cniApp.cniMesosAttr.Labels.NetworkName = elem.Value case cniapi.LabelNetworkGroup: cniApp.cniMesosAttr.Labels.NetworkGroup = elem.Value } } }
[ "func", "(", "cniApp", "*", "cniAppInfo", ")", "parseNwInfoLabels", "(", ")", "{", "var", "cniNetInfo", "struct", "{", "Args", "struct", "{", "Mesos", "struct", "{", "NetworkInfo", "struct", "{", "Labels", "struct", "{", "NwLabel", "[", "]", "cniapi", ".",...
// parse labels from network_info
[ "parse", "labels", "from", "network_info" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/mgmtfn/mesosplugin/netcontiv/cniplugin.go#L108-L151
7,808
contiv/netplugin
mgmtfn/mesosplugin/netcontiv/cniplugin.go
sendCniResp
func (cniApp *cniAppInfo) sendCniResp(cniResp []byte, retCode int) int { cniLog.Infof("sent CNI response: %s ", cniResp) fmt.Printf("%s\n", string(cniResp)) return retCode }
go
func (cniApp *cniAppInfo) sendCniResp(cniResp []byte, retCode int) int { cniLog.Infof("sent CNI response: %s ", cniResp) fmt.Printf("%s\n", string(cniResp)) return retCode }
[ "func", "(", "cniApp", "*", "cniAppInfo", ")", "sendCniResp", "(", "cniResp", "[", "]", "byte", ",", "retCode", "int", ")", "int", "{", "cniLog", ".", "Infof", "(", "\"", "\"", ",", "cniResp", ")", "\n", "fmt", ".", "Printf", "(", "\"", "\\n", "\""...
// send response received from netplugin to stdout
[ "send", "response", "received", "from", "netplugin", "to", "stdout" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/mgmtfn/mesosplugin/netcontiv/cniplugin.go#L154-L158
7,809
contiv/netplugin
mgmtfn/mesosplugin/netcontiv/cniplugin.go
sendCniErrorResp
func (cniApp *cniAppInfo) sendCniErrorResp(errorMsg string) int { cniLog.Infof("prepare CNI error response: %s ", errorMsg) // CNI_ERROR_UNSUPPORTED is sent for all errors cniResp := cniapi.CniCmdErrorResp{CniVersion: cniapi.CniDefaultVersion, ErrCode: cniapi.CniStatusErrorUnsupportedField, ErrMsg: "contiv: " + errorMsg} jsonResp, err := json.Marshal(cniResp) if err == nil { fmt.Printf("%s\n", string(jsonResp)) cniLog.Infof("CNI error response: %s", string(jsonResp)) } else { cniLog.Errorf("failed to convert CNI error response to JSON, %s ", err) // send minimal response to stdout fmt.Printf("{ \n") fmt.Printf("\"cniVersion\": \"%s\" \n", cniResp.CniVersion) fmt.Printf("\"code\": \"%d\" \n", cniResp.ErrCode) fmt.Printf("\"msg\": \"%s %s\" \n", "contiv", cniResp.ErrMsg) fmt.Printf("} \n") } return int(cniResp.ErrCode) }
go
func (cniApp *cniAppInfo) sendCniErrorResp(errorMsg string) int { cniLog.Infof("prepare CNI error response: %s ", errorMsg) // CNI_ERROR_UNSUPPORTED is sent for all errors cniResp := cniapi.CniCmdErrorResp{CniVersion: cniapi.CniDefaultVersion, ErrCode: cniapi.CniStatusErrorUnsupportedField, ErrMsg: "contiv: " + errorMsg} jsonResp, err := json.Marshal(cniResp) if err == nil { fmt.Printf("%s\n", string(jsonResp)) cniLog.Infof("CNI error response: %s", string(jsonResp)) } else { cniLog.Errorf("failed to convert CNI error response to JSON, %s ", err) // send minimal response to stdout fmt.Printf("{ \n") fmt.Printf("\"cniVersion\": \"%s\" \n", cniResp.CniVersion) fmt.Printf("\"code\": \"%d\" \n", cniResp.ErrCode) fmt.Printf("\"msg\": \"%s %s\" \n", "contiv", cniResp.ErrMsg) fmt.Printf("} \n") } return int(cniResp.ErrCode) }
[ "func", "(", "cniApp", "*", "cniAppInfo", ")", "sendCniErrorResp", "(", "errorMsg", "string", ")", "int", "{", "cniLog", ".", "Infof", "(", "\"", "\"", ",", "errorMsg", ")", "\n", "// CNI_ERROR_UNSUPPORTED is sent for all errors", "cniResp", ":=", "cniapi", ".",...
// send error response & return code
[ "send", "error", "response", "&", "return", "code" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/mgmtfn/mesosplugin/netcontiv/cniplugin.go#L161-L182
7,810
contiv/netplugin
mgmtfn/mesosplugin/netcontiv/cniplugin.go
handleHTTP
func (cniApp *cniAppInfo) handleHTTP(url string, jsonReq *bytes.Buffer) int { cniLog.Infof("http POST url: %s data: %v", url, jsonReq) httpResp, err := cniApp.httpClient.Post(url, "application/json", jsonReq) if err != nil { return cniApp.sendCniErrorResp("failed to get response from netplugin :" + err.Error()) } defer httpResp.Body.Close() switch httpResp.StatusCode { case http.StatusOK: cniLog.Infof("received http OK response from netplugin") info, err := ioutil.ReadAll(httpResp.Body) if err != nil { return cniApp.sendCniErrorResp("failed to read success response from netplugin :" + err.Error()) } return cniApp.sendCniResp(info, cniapi.CniStatusSuccess) case http.StatusInternalServerError: cniLog.Infof("received http error response from netplugin") info, err := ioutil.ReadAll(httpResp.Body) if err != nil { return cniApp.sendCniErrorResp("failed to read error response from netplugin :" + err.Error()) } return cniApp.sendCniResp(info, cniapi.CniStatusErrorUnsupportedField) default: cniLog.Infof("received unknown error from netplugin") return cniApp.sendCniErrorResp("error response from netplugin: " + http.StatusText(httpResp.StatusCode)) } }
go
func (cniApp *cniAppInfo) handleHTTP(url string, jsonReq *bytes.Buffer) int { cniLog.Infof("http POST url: %s data: %v", url, jsonReq) httpResp, err := cniApp.httpClient.Post(url, "application/json", jsonReq) if err != nil { return cniApp.sendCniErrorResp("failed to get response from netplugin :" + err.Error()) } defer httpResp.Body.Close() switch httpResp.StatusCode { case http.StatusOK: cniLog.Infof("received http OK response from netplugin") info, err := ioutil.ReadAll(httpResp.Body) if err != nil { return cniApp.sendCniErrorResp("failed to read success response from netplugin :" + err.Error()) } return cniApp.sendCniResp(info, cniapi.CniStatusSuccess) case http.StatusInternalServerError: cniLog.Infof("received http error response from netplugin") info, err := ioutil.ReadAll(httpResp.Body) if err != nil { return cniApp.sendCniErrorResp("failed to read error response from netplugin :" + err.Error()) } return cniApp.sendCniResp(info, cniapi.CniStatusErrorUnsupportedField) default: cniLog.Infof("received unknown error from netplugin") return cniApp.sendCniErrorResp("error response from netplugin: " + http.StatusText(httpResp.StatusCode)) } }
[ "func", "(", "cniApp", "*", "cniAppInfo", ")", "handleHTTP", "(", "url", "string", ",", "jsonReq", "*", "bytes", ".", "Buffer", ")", "int", "{", "cniLog", ".", "Infof", "(", "\"", "\"", ",", "url", ",", "jsonReq", ")", "\n", "httpResp", ",", "err", ...
// handle http req & response to netplugin
[ "handle", "http", "req", "&", "response", "to", "netplugin" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/mgmtfn/mesosplugin/netcontiv/cniplugin.go#L185-L216
7,811
contiv/netplugin
mgmtfn/mesosplugin/netcontiv/cniplugin.go
init
func (cniApp *cniAppInfo) init() { cniApp.serverURL = "http://localhost" trans := &http.Transport{Dial: func(network, addr string) (net.Conn, error) { return net.Dial("unix", cniapi.ContivMesosSocket) }} cniApp.httpClient = &http.Client{Transport: trans} }
go
func (cniApp *cniAppInfo) init() { cniApp.serverURL = "http://localhost" trans := &http.Transport{Dial: func(network, addr string) (net.Conn, error) { return net.Dial("unix", cniapi.ContivMesosSocket) }} cniApp.httpClient = &http.Client{Transport: trans} }
[ "func", "(", "cniApp", "*", "cniAppInfo", ")", "init", "(", ")", "{", "cniApp", ".", "serverURL", "=", "\"", "\"", "\n\n", "trans", ":=", "&", "http", ".", "Transport", "{", "Dial", ":", "func", "(", "network", ",", "addr", "string", ")", "(", "net...
// initialize netplugin client
[ "initialize", "netplugin", "client" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/mgmtfn/mesosplugin/netcontiv/cniplugin.go#L235-L243
7,812
contiv/netplugin
version/version.go
Get
func Get() *Info { ver := Info{} ver.GitCommit = gitCommit ver.Version = version ver.BuildTime = buildTime return &ver }
go
func Get() *Info { ver := Info{} ver.GitCommit = gitCommit ver.Version = version ver.BuildTime = buildTime return &ver }
[ "func", "Get", "(", ")", "*", "Info", "{", "ver", ":=", "Info", "{", "}", "\n", "ver", ".", "GitCommit", "=", "gitCommit", "\n", "ver", ".", "Version", "=", "version", "\n", "ver", ".", "BuildTime", "=", "buildTime", "\n\n", "return", "&", "ver", "...
// Get gets the version information
[ "Get", "gets", "the", "version", "information" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/version/version.go#L36-L43
7,813
contiv/netplugin
version/version.go
StringFromInfo
func StringFromInfo(ver *Info) string { return fmt.Sprintf("Version: %s\n", ver.Version) + fmt.Sprintf("GitCommit: %s\n", ver.GitCommit) + fmt.Sprintf("BuildTime: %s\n", ver.BuildTime) }
go
func StringFromInfo(ver *Info) string { return fmt.Sprintf("Version: %s\n", ver.Version) + fmt.Sprintf("GitCommit: %s\n", ver.GitCommit) + fmt.Sprintf("BuildTime: %s\n", ver.BuildTime) }
[ "func", "StringFromInfo", "(", "ver", "*", "Info", ")", "string", "{", "return", "fmt", ".", "Sprintf", "(", "\"", "\\n", "\"", ",", "ver", ".", "Version", ")", "+", "fmt", ".", "Sprintf", "(", "\"", "\\n", "\"", ",", "ver", ".", "GitCommit", ")", ...
// StringFromInfo prints the versioning details
[ "StringFromInfo", "prints", "the", "versioning", "details" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/version/version.go#L52-L56
7,814
contiv/netplugin
mgmtfn/dockplugin/dockplugin.go
InitDockPlugin
func InitDockPlugin(np *plugin.NetPlugin, mode string) error { // Save state netPlugin = np pluginMode = mode // Get local hostname hostname, err := os.Hostname() if err != nil { log.Fatalf("Could not retrieve hostname: %v", err) } log.Debugf("Configuring router") router := mux.NewRouter() s := router.Methods("POST").Subrouter() dispatchMap := map[string]func(http.ResponseWriter, *http.Request){ "/Plugin.Activate": activate(hostname), "/Plugin.Deactivate": deactivate(hostname), "/NetworkDriver.GetCapabilities": getCapability, "/NetworkDriver.CreateNetwork": createNetwork, "/NetworkDriver.DeleteNetwork": deleteNetwork, "/NetworkDriver.CreateEndpoint": createEndpoint(hostname), "/NetworkDriver.DeleteEndpoint": deleteEndpoint(hostname), "/NetworkDriver.EndpointOperInfo": endpointInfo, "/NetworkDriver.Join": join, "/NetworkDriver.Leave": leave, "/NetworkDriver.AllocateNetwork": allocateNetwork, "/NetworkDriver.FreeNetwork": freeNetwork, "/NetworkDriver.ProgramExternalConnectivity": programExternalConnectivity, "/NetworkDriver.RevokeExternalConnectivity": revokeExternalConnectivity, "/NetworkDriver.DiscoverNew": discoverNew, "/NetworkDriver.DiscoverDelete": discoverDelete, "/IpamDriver.GetDefaultAddressSpaces": getDefaultAddressSpaces, "/IpamDriver.RequestPool": requestPool, "/IpamDriver.ReleasePool": releasePool, "/IpamDriver.RequestAddress": requestAddress, "/IpamDriver.ReleaseAddress": releaseAddress, "/IpamDriver.GetCapabilities": getIpamCapability, } for dispatchPath, dispatchFunc := range dispatchMap { s.HandleFunc(dispatchPath, logHandler(dispatchPath, dispatchFunc)) } s.HandleFunc("/NetworkDriver.{*}", unknownAction) s.HandleFunc("/IpamDriver.{*}", unknownAction) driverPath := path.Join(pluginPath, driverName) + ".sock" os.Remove(driverPath) os.MkdirAll(pluginPath, 0700) go func() { l, err := net.ListenUnix("unix", &net.UnixAddr{Name: driverPath, Net: "unix"}) if err != nil { panic(err) } log.Infof("docker plugin listening on %s", driverPath) server := &http.Server{Handler: router} server.SetKeepAlivesEnabled(false) server.Serve(l) l.Close() log.Infof("docker plugin closing %s", driverPath) }() return nil }
go
func InitDockPlugin(np *plugin.NetPlugin, mode string) error { // Save state netPlugin = np pluginMode = mode // Get local hostname hostname, err := os.Hostname() if err != nil { log.Fatalf("Could not retrieve hostname: %v", err) } log.Debugf("Configuring router") router := mux.NewRouter() s := router.Methods("POST").Subrouter() dispatchMap := map[string]func(http.ResponseWriter, *http.Request){ "/Plugin.Activate": activate(hostname), "/Plugin.Deactivate": deactivate(hostname), "/NetworkDriver.GetCapabilities": getCapability, "/NetworkDriver.CreateNetwork": createNetwork, "/NetworkDriver.DeleteNetwork": deleteNetwork, "/NetworkDriver.CreateEndpoint": createEndpoint(hostname), "/NetworkDriver.DeleteEndpoint": deleteEndpoint(hostname), "/NetworkDriver.EndpointOperInfo": endpointInfo, "/NetworkDriver.Join": join, "/NetworkDriver.Leave": leave, "/NetworkDriver.AllocateNetwork": allocateNetwork, "/NetworkDriver.FreeNetwork": freeNetwork, "/NetworkDriver.ProgramExternalConnectivity": programExternalConnectivity, "/NetworkDriver.RevokeExternalConnectivity": revokeExternalConnectivity, "/NetworkDriver.DiscoverNew": discoverNew, "/NetworkDriver.DiscoverDelete": discoverDelete, "/IpamDriver.GetDefaultAddressSpaces": getDefaultAddressSpaces, "/IpamDriver.RequestPool": requestPool, "/IpamDriver.ReleasePool": releasePool, "/IpamDriver.RequestAddress": requestAddress, "/IpamDriver.ReleaseAddress": releaseAddress, "/IpamDriver.GetCapabilities": getIpamCapability, } for dispatchPath, dispatchFunc := range dispatchMap { s.HandleFunc(dispatchPath, logHandler(dispatchPath, dispatchFunc)) } s.HandleFunc("/NetworkDriver.{*}", unknownAction) s.HandleFunc("/IpamDriver.{*}", unknownAction) driverPath := path.Join(pluginPath, driverName) + ".sock" os.Remove(driverPath) os.MkdirAll(pluginPath, 0700) go func() { l, err := net.ListenUnix("unix", &net.UnixAddr{Name: driverPath, Net: "unix"}) if err != nil { panic(err) } log.Infof("docker plugin listening on %s", driverPath) server := &http.Server{Handler: router} server.SetKeepAlivesEnabled(false) server.Serve(l) l.Close() log.Infof("docker plugin closing %s", driverPath) }() return nil }
[ "func", "InitDockPlugin", "(", "np", "*", "plugin", ".", "NetPlugin", ",", "mode", "string", ")", "error", "{", "// Save state", "netPlugin", "=", "np", "\n", "pluginMode", "=", "mode", "\n\n", "// Get local hostname", "hostname", ",", "err", ":=", "os", "."...
// InitDockPlugin initializes the docker plugin
[ "InitDockPlugin", "initializes", "the", "docker", "plugin" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/mgmtfn/dockplugin/dockplugin.go#L44-L111
7,815
contiv/netplugin
mgmtfn/dockplugin/dockplugin.go
deactivate
func deactivate(hostname string) func(http.ResponseWriter, *http.Request) { return func(w http.ResponseWriter, r *http.Request) { logEvent("deactivate") } }
go
func deactivate(hostname string) func(http.ResponseWriter, *http.Request) { return func(w http.ResponseWriter, r *http.Request) { logEvent("deactivate") } }
[ "func", "deactivate", "(", "hostname", "string", ")", "func", "(", "http", ".", "ResponseWriter", ",", "*", "http", ".", "Request", ")", "{", "return", "func", "(", "w", "http", ".", "ResponseWriter", ",", "r", "*", "http", ".", "Request", ")", "{", ...
// deactivate the plugin
[ "deactivate", "the", "plugin" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/mgmtfn/dockplugin/dockplugin.go#L159-L163
7,816
contiv/netplugin
mgmtfn/dockplugin/dockplugin.go
activate
func activate(hostname string) func(http.ResponseWriter, *http.Request) { return func(w http.ResponseWriter, r *http.Request) { logEvent("activate") content, err := json.Marshal(plugins.Manifest{Implements: []string{"NetworkDriver", "IpamDriver"}}) if err != nil { httpError(w, "Could not generate bootstrap response", err) return } w.Write(content) } }
go
func activate(hostname string) func(http.ResponseWriter, *http.Request) { return func(w http.ResponseWriter, r *http.Request) { logEvent("activate") content, err := json.Marshal(plugins.Manifest{Implements: []string{"NetworkDriver", "IpamDriver"}}) if err != nil { httpError(w, "Could not generate bootstrap response", err) return } w.Write(content) } }
[ "func", "activate", "(", "hostname", "string", ")", "func", "(", "http", ".", "ResponseWriter", ",", "*", "http", ".", "Request", ")", "{", "return", "func", "(", "w", "http", ".", "ResponseWriter", ",", "r", "*", "http", ".", "Request", ")", "{", "l...
// activate the plugin and register it as a network driver.
[ "activate", "the", "plugin", "and", "register", "it", "as", "a", "network", "driver", "." ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/mgmtfn/dockplugin/dockplugin.go#L166-L178
7,817
contiv/netplugin
mgmtfn/dockplugin/netDriver.go
GetDockerNetworkName
func GetDockerNetworkName(nwID string) (string, string, string, error) { // first see if we can find the network in docknet oper state dnetOper, err := docknet.FindDocknetByUUID(nwID) if err == nil { return dnetOper.TenantName, dnetOper.NetworkName, dnetOper.ServiceName, nil } if pluginMode == core.SwarmMode { log.Errorf("Unable to find docknet info in objstore") return "", "", "", err } // create docker client docker, err := dockerclient.NewClient("unix:///var/run/docker.sock", "", nil, nil) if err != nil { log.Errorf("Unable to connect to docker. Error %v", err) return "", "", "", errors.New("unable to connect to docker") } nwIDFilter := filters.NewArgs() nwIDFilter.Add("id", nwID) nwList, err := docker.NetworkList(context.Background(), types.NetworkListOptions{Filters: nwIDFilter}) if err != nil { log.Infof("Error: %v", err) return "", "", "", err } if len(nwList) != 1 { if len(nwList) == 0 { err = errors.New("network UUID not found") } else { err = errors.New("more than one network found with the same ID") } return "", "", "", err } nw := nwList[0] log.Infof("Returning network name %s for ID %s", nw.Name, nwID) // parse the network name var tenantName, netName, serviceName string names := strings.Split(nw.Name, "/") if len(names) == 2 { // has service.network/tenant format. tenantName = names[1] // parse service and network names sNames := strings.Split(names[0], ".") if len(sNames) == 2 { // has service.network format netName = sNames[1] serviceName = sNames[0] } else { netName = sNames[0] } } else if len(names) == 1 { // has service.network in default tenant tenantName = defaultTenantName // parse service and network names sNames := strings.Split(names[0], ".") if len(sNames) == 2 { // has service.network format netName = sNames[1] serviceName = sNames[0] } else { netName = sNames[0] } } else { log.Errorf("Invalid network name format for network %s", nw.Name) return "", "", "", errors.New("invalid format") } return tenantName, netName, serviceName, nil }
go
func GetDockerNetworkName(nwID string) (string, string, string, error) { // first see if we can find the network in docknet oper state dnetOper, err := docknet.FindDocknetByUUID(nwID) if err == nil { return dnetOper.TenantName, dnetOper.NetworkName, dnetOper.ServiceName, nil } if pluginMode == core.SwarmMode { log.Errorf("Unable to find docknet info in objstore") return "", "", "", err } // create docker client docker, err := dockerclient.NewClient("unix:///var/run/docker.sock", "", nil, nil) if err != nil { log.Errorf("Unable to connect to docker. Error %v", err) return "", "", "", errors.New("unable to connect to docker") } nwIDFilter := filters.NewArgs() nwIDFilter.Add("id", nwID) nwList, err := docker.NetworkList(context.Background(), types.NetworkListOptions{Filters: nwIDFilter}) if err != nil { log.Infof("Error: %v", err) return "", "", "", err } if len(nwList) != 1 { if len(nwList) == 0 { err = errors.New("network UUID not found") } else { err = errors.New("more than one network found with the same ID") } return "", "", "", err } nw := nwList[0] log.Infof("Returning network name %s for ID %s", nw.Name, nwID) // parse the network name var tenantName, netName, serviceName string names := strings.Split(nw.Name, "/") if len(names) == 2 { // has service.network/tenant format. tenantName = names[1] // parse service and network names sNames := strings.Split(names[0], ".") if len(sNames) == 2 { // has service.network format netName = sNames[1] serviceName = sNames[0] } else { netName = sNames[0] } } else if len(names) == 1 { // has service.network in default tenant tenantName = defaultTenantName // parse service and network names sNames := strings.Split(names[0], ".") if len(sNames) == 2 { // has service.network format netName = sNames[1] serviceName = sNames[0] } else { netName = sNames[0] } } else { log.Errorf("Invalid network name format for network %s", nw.Name) return "", "", "", errors.New("invalid format") } return tenantName, netName, serviceName, nil }
[ "func", "GetDockerNetworkName", "(", "nwID", "string", ")", "(", "string", ",", "string", ",", "string", ",", "error", ")", "{", "// first see if we can find the network in docknet oper state", "dnetOper", ",", "err", ":=", "docknet", ".", "FindDocknetByUUID", "(", ...
// GetDockerNetworkName gets network name from network UUID
[ "GetDockerNetworkName", "gets", "network", "name", "from", "network", "UUID" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/mgmtfn/dockplugin/netDriver.go#L534-L606
7,818
contiv/netplugin
mgmtfn/dockplugin/netDriver.go
FindGroupFromTag
func FindGroupFromTag(epgTag string) (*mastercfg.EndpointGroupState, error) { stateDriver, err := utils.GetStateDriver() if err != nil { return nil, err } epgCfg := &mastercfg.EndpointGroupState{} epgCfg.StateDriver = stateDriver epgList, err := epgCfg.ReadAll() if err != nil { return nil, err } var epg *mastercfg.EndpointGroupState found := false for _, epgP := range epgList { epg = epgP.(*mastercfg.EndpointGroupState) if epg.GroupTag == epgTag { found = true break } } if !found { return nil, fmt.Errorf("Couldn't find group matching the tag %s", epgTag) } return epg, nil }
go
func FindGroupFromTag(epgTag string) (*mastercfg.EndpointGroupState, error) { stateDriver, err := utils.GetStateDriver() if err != nil { return nil, err } epgCfg := &mastercfg.EndpointGroupState{} epgCfg.StateDriver = stateDriver epgList, err := epgCfg.ReadAll() if err != nil { return nil, err } var epg *mastercfg.EndpointGroupState found := false for _, epgP := range epgList { epg = epgP.(*mastercfg.EndpointGroupState) if epg.GroupTag == epgTag { found = true break } } if !found { return nil, fmt.Errorf("Couldn't find group matching the tag %s", epgTag) } return epg, nil }
[ "func", "FindGroupFromTag", "(", "epgTag", "string", ")", "(", "*", "mastercfg", ".", "EndpointGroupState", ",", "error", ")", "{", "stateDriver", ",", "err", ":=", "utils", ".", "GetStateDriver", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", ...
// FindGroupFromTag finds the group that has matching tag
[ "FindGroupFromTag", "finds", "the", "group", "that", "has", "matching", "tag" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/mgmtfn/dockplugin/netDriver.go#L609-L636
7,819
contiv/netplugin
mgmtfn/dockplugin/netDriver.go
FindNetworkFromTag
func FindNetworkFromTag(nwTag string) (*mastercfg.CfgNetworkState, error) { stateDriver, err := utils.GetStateDriver() if err != nil { return nil, err } nwCfg := &mastercfg.CfgNetworkState{} nwCfg.StateDriver = stateDriver nwList, err := nwCfg.ReadAll() if err != nil { return nil, err } var nw *mastercfg.CfgNetworkState found := false for _, nwP := range nwList { nw = nwP.(*mastercfg.CfgNetworkState) if nw.NetworkTag == nwTag { found = true break } } if !found { return nil, fmt.Errorf("Couldn't find network matching the tag %s", nwTag) } return nw, nil }
go
func FindNetworkFromTag(nwTag string) (*mastercfg.CfgNetworkState, error) { stateDriver, err := utils.GetStateDriver() if err != nil { return nil, err } nwCfg := &mastercfg.CfgNetworkState{} nwCfg.StateDriver = stateDriver nwList, err := nwCfg.ReadAll() if err != nil { return nil, err } var nw *mastercfg.CfgNetworkState found := false for _, nwP := range nwList { nw = nwP.(*mastercfg.CfgNetworkState) if nw.NetworkTag == nwTag { found = true break } } if !found { return nil, fmt.Errorf("Couldn't find network matching the tag %s", nwTag) } return nw, nil }
[ "func", "FindNetworkFromTag", "(", "nwTag", "string", ")", "(", "*", "mastercfg", ".", "CfgNetworkState", ",", "error", ")", "{", "stateDriver", ",", "err", ":=", "utils", ".", "GetStateDriver", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "n...
// FindNetworkFromTag finds the network that has matching tag
[ "FindNetworkFromTag", "finds", "the", "network", "that", "has", "matching", "tag" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/mgmtfn/dockplugin/netDriver.go#L639-L663
7,820
contiv/netplugin
mgmtfn/dockplugin/netDriver.go
createNetworkHelper
func createNetworkHelper(networkID string, tag string, IPv4Data, IPv6Data []driverapi.IPAMData) error { var tenantName, networkName, serviceName string var err error if tag != "" { // we need to map docker network to policy group or network using the tag log.Infof("Received tag %s", tag) var nw *mastercfg.CfgNetworkState epg, err := FindGroupFromTag(tag) if err != nil { nw, err = FindNetworkFromTag(tag) if err != nil { return errors.New("failed to lookup tag") } } if epg != nil { tenantName = epg.TenantName networkName = epg.NetworkName serviceName = epg.GroupName } else if nw != nil { tenantName = nw.Tenant networkName = nw.NetworkName serviceName = "" } } else if len(IPv4Data) > 0 { // if subnet is specified in docker command, we create a contiv network subnetPool := "" gateway := "" if IPv4Data[0].Pool != nil { subnetPool = IPv4Data[0].Pool.String() } if IPv4Data[0].Gateway != nil { gateway = strings.Split(IPv4Data[0].Gateway.String(), "/")[0] } subnetv6 := "" gatewayv6 := "" if len(IPv6Data) > 0 { if IPv6Data[0].Pool != nil { subnetv6 = IPv6Data[0].Pool.String() } if IPv6Data[0].Gateway != nil { gatewayv6 = strings.Split(IPv6Data[0].Gateway.String(), "/")[0] } } // build key and URL keyStr := "default" + ":" + networkID url := "/api/v1/networks/" + keyStr + "/" tenantName = "default" networkName = networkID serviceName = "" req := client.Network{ TenantName: tenantName, NetworkName: networkName, Subnet: subnetPool, Gateway: gateway, Ipv6Subnet: subnetv6, Ipv6Gateway: gatewayv6, Encap: "vxlan", } var resp client.Network err = cluster.MasterPostReq(url, &req, &resp) if err != nil { log.Errorf("failed to create network in netmaster: %s", err.Error()) return errors.New("failed to create network in netmaster") } log.Infof("Created contiv network %+v", req) } // Create docknet oper state to map the docker network to contiv network // We do not create a network in docker as it is created explicitly by user err = docknet.CreateDockNetState(tenantName, networkName, serviceName, networkID) if err != nil { log.Errorf("Error creating docknet state: %s", err.Error()) return errors.New("Error creating docknet state") } return nil }
go
func createNetworkHelper(networkID string, tag string, IPv4Data, IPv6Data []driverapi.IPAMData) error { var tenantName, networkName, serviceName string var err error if tag != "" { // we need to map docker network to policy group or network using the tag log.Infof("Received tag %s", tag) var nw *mastercfg.CfgNetworkState epg, err := FindGroupFromTag(tag) if err != nil { nw, err = FindNetworkFromTag(tag) if err != nil { return errors.New("failed to lookup tag") } } if epg != nil { tenantName = epg.TenantName networkName = epg.NetworkName serviceName = epg.GroupName } else if nw != nil { tenantName = nw.Tenant networkName = nw.NetworkName serviceName = "" } } else if len(IPv4Data) > 0 { // if subnet is specified in docker command, we create a contiv network subnetPool := "" gateway := "" if IPv4Data[0].Pool != nil { subnetPool = IPv4Data[0].Pool.String() } if IPv4Data[0].Gateway != nil { gateway = strings.Split(IPv4Data[0].Gateway.String(), "/")[0] } subnetv6 := "" gatewayv6 := "" if len(IPv6Data) > 0 { if IPv6Data[0].Pool != nil { subnetv6 = IPv6Data[0].Pool.String() } if IPv6Data[0].Gateway != nil { gatewayv6 = strings.Split(IPv6Data[0].Gateway.String(), "/")[0] } } // build key and URL keyStr := "default" + ":" + networkID url := "/api/v1/networks/" + keyStr + "/" tenantName = "default" networkName = networkID serviceName = "" req := client.Network{ TenantName: tenantName, NetworkName: networkName, Subnet: subnetPool, Gateway: gateway, Ipv6Subnet: subnetv6, Ipv6Gateway: gatewayv6, Encap: "vxlan", } var resp client.Network err = cluster.MasterPostReq(url, &req, &resp) if err != nil { log.Errorf("failed to create network in netmaster: %s", err.Error()) return errors.New("failed to create network in netmaster") } log.Infof("Created contiv network %+v", req) } // Create docknet oper state to map the docker network to contiv network // We do not create a network in docker as it is created explicitly by user err = docknet.CreateDockNetState(tenantName, networkName, serviceName, networkID) if err != nil { log.Errorf("Error creating docknet state: %s", err.Error()) return errors.New("Error creating docknet state") } return nil }
[ "func", "createNetworkHelper", "(", "networkID", "string", ",", "tag", "string", ",", "IPv4Data", ",", "IPv6Data", "[", "]", "driverapi", ".", "IPAMData", ")", "error", "{", "var", "tenantName", ",", "networkName", ",", "serviceName", "string", "\n", "var", ...
// createNetworkHelper creates the association between docker network and contiv network // if tag is given map docker net to epg or network, else create a contiv network
[ "createNetworkHelper", "creates", "the", "association", "between", "docker", "network", "and", "contiv", "network", "if", "tag", "is", "given", "map", "docker", "net", "to", "epg", "or", "network", "else", "create", "a", "contiv", "network" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/mgmtfn/dockplugin/netDriver.go#L667-L744
7,821
contiv/netplugin
mgmtfn/dockplugin/netDriver.go
deleteNetworkHelper
func deleteNetworkHelper(networkID string) error { dnet, err := docknet.FindDocknetByUUID(networkID) if err == nil { // delete the dnet oper state err = docknet.DeleteDockNetState(dnet.TenantName, dnet.NetworkName, dnet.ServiceName) if err != nil { msg := fmt.Sprintf("Could not delete docknet for nwID %s: %s", networkID, err.Error()) log.Errorf(msg) return errors.New(msg) } log.Infof("Deleted docker network mapping for %v", networkID) } else { msg := fmt.Sprintf("Could not find Docker network %s: %s", networkID, err.Error()) log.Errorf(msg) } netID := networkID + ".default" _, err = utils.GetNetwork(netID) if err == nil { // if we find a contiv network with the ID hash, then it must be // a docker created network (from the libnetwork create api). // build key and URL keyStr := "default" + ":" + networkID url := "/api/v1/networks/" + keyStr + "/" err = cluster.MasterDelReq(url) if err != nil { msg := fmt.Sprintf("Failed to delete network: %s", err.Error()) log.Errorf(msg) return errors.New(msg) } log.Infof("Deleted contiv network %v", networkID) } else { log.Infof("Could not find contiv network %v", networkID) } return nil }
go
func deleteNetworkHelper(networkID string) error { dnet, err := docknet.FindDocknetByUUID(networkID) if err == nil { // delete the dnet oper state err = docknet.DeleteDockNetState(dnet.TenantName, dnet.NetworkName, dnet.ServiceName) if err != nil { msg := fmt.Sprintf("Could not delete docknet for nwID %s: %s", networkID, err.Error()) log.Errorf(msg) return errors.New(msg) } log.Infof("Deleted docker network mapping for %v", networkID) } else { msg := fmt.Sprintf("Could not find Docker network %s: %s", networkID, err.Error()) log.Errorf(msg) } netID := networkID + ".default" _, err = utils.GetNetwork(netID) if err == nil { // if we find a contiv network with the ID hash, then it must be // a docker created network (from the libnetwork create api). // build key and URL keyStr := "default" + ":" + networkID url := "/api/v1/networks/" + keyStr + "/" err = cluster.MasterDelReq(url) if err != nil { msg := fmt.Sprintf("Failed to delete network: %s", err.Error()) log.Errorf(msg) return errors.New(msg) } log.Infof("Deleted contiv network %v", networkID) } else { log.Infof("Could not find contiv network %v", networkID) } return nil }
[ "func", "deleteNetworkHelper", "(", "networkID", "string", ")", "error", "{", "dnet", ",", "err", ":=", "docknet", ".", "FindDocknetByUUID", "(", "networkID", ")", "\n", "if", "err", "==", "nil", "{", "// delete the dnet oper state", "err", "=", "docknet", "."...
// deleteNetworkHelper removes the association between docker network // and contiv network. We have to remove docker network state before // remove network in contiv.
[ "deleteNetworkHelper", "removes", "the", "association", "between", "docker", "network", "and", "contiv", "network", ".", "We", "have", "to", "remove", "docker", "network", "state", "before", "remove", "network", "in", "contiv", "." ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/mgmtfn/dockplugin/netDriver.go#L749-L786
7,822
contiv/netplugin
netplugin/agent/docker_event.go
handleDockerEvents
func (ag *Agent) handleDockerEvents(events <-chan events.Message, errs <-chan error) { for { select { case err := <-errs: if err != nil && err == io.EOF { log.Errorf("Closing the events channel. Err: %+v", err) return } if err != nil && err != io.EOF { log.Errorf("Received error from docker events. Err: %+v", err) } case event := <-events: log.Debugf("Received Docker event: {%#v}\n", event) // process events only when LB services exist. if !ag.lbServiceExist() { continue } switch event.Status { case "start": endpointUpdReq := &master.UpdateEndpointRequest{} defaultHeaders := map[string]string{"User-Agent": "Docker-Client/" + dockerversion.Version + " (" + runtime.GOOS + ")"} cli, err := dockerclient.NewClient("unix:///var/run/docker.sock", "v1.21", nil, defaultHeaders) if err != nil { panic(err) } containerInfo, err := cli.ContainerInspect(context.Background(), event.ID) if err != nil { log.Errorf("Container Inspect failed :%s", err) break } if event.ID != "" { labelMap := getLabelsFromContainerInspect(&containerInfo) containerTenant := getTenantFromContainerInspect(&containerInfo) networkName, ipAddress, err := getEpNetworkInfoFromContainerInspect(&containerInfo) if err != nil { log.Errorf("Error getting container network info for %v.Err:%s", event.ID, err) } endpoint := getEndpointFromContainerInspect(&containerInfo) if ipAddress != "" { //Create provider info endpointUpdReq.IPAddress = ipAddress endpointUpdReq.ContainerID = event.ID endpointUpdReq.Tenant = containerTenant endpointUpdReq.Network = networkName endpointUpdReq.Event = "start" endpointUpdReq.EndpointID = endpoint endpointUpdReq.EPCommonName = containerInfo.Name endpointUpdReq.Labels = make(map[string]string) for k, v := range labelMap { endpointUpdReq.Labels[k] = v } } var epUpdResp master.UpdateEndpointResponse log.Infof("Sending Endpoint update request to master: {%+v}", endpointUpdReq) err = cluster.MasterPostReq("/plugin/updateEndpoint", endpointUpdReq, &epUpdResp) if err != nil { log.Errorf("Event: 'start' , Http error posting endpoint update, Error:%s", err) } } else { log.Errorf("Unable to fetch container labels for container %s ", event.ID) } case "die": endpointUpdReq := &master.UpdateEndpointRequest{} endpointUpdReq.ContainerID = event.ID endpointUpdReq.Event = "die" var epUpdResp master.UpdateEndpointResponse log.Infof("Sending Endpoint update request to master: {%+v} on container delete", endpointUpdReq) err := cluster.MasterPostReq("/plugin/updateEndpoint", endpointUpdReq, &epUpdResp) if err != nil { log.Errorf("Event:'die' Http error posting endpoint update, Error:%s", err) } } } } }
go
func (ag *Agent) handleDockerEvents(events <-chan events.Message, errs <-chan error) { for { select { case err := <-errs: if err != nil && err == io.EOF { log.Errorf("Closing the events channel. Err: %+v", err) return } if err != nil && err != io.EOF { log.Errorf("Received error from docker events. Err: %+v", err) } case event := <-events: log.Debugf("Received Docker event: {%#v}\n", event) // process events only when LB services exist. if !ag.lbServiceExist() { continue } switch event.Status { case "start": endpointUpdReq := &master.UpdateEndpointRequest{} defaultHeaders := map[string]string{"User-Agent": "Docker-Client/" + dockerversion.Version + " (" + runtime.GOOS + ")"} cli, err := dockerclient.NewClient("unix:///var/run/docker.sock", "v1.21", nil, defaultHeaders) if err != nil { panic(err) } containerInfo, err := cli.ContainerInspect(context.Background(), event.ID) if err != nil { log.Errorf("Container Inspect failed :%s", err) break } if event.ID != "" { labelMap := getLabelsFromContainerInspect(&containerInfo) containerTenant := getTenantFromContainerInspect(&containerInfo) networkName, ipAddress, err := getEpNetworkInfoFromContainerInspect(&containerInfo) if err != nil { log.Errorf("Error getting container network info for %v.Err:%s", event.ID, err) } endpoint := getEndpointFromContainerInspect(&containerInfo) if ipAddress != "" { //Create provider info endpointUpdReq.IPAddress = ipAddress endpointUpdReq.ContainerID = event.ID endpointUpdReq.Tenant = containerTenant endpointUpdReq.Network = networkName endpointUpdReq.Event = "start" endpointUpdReq.EndpointID = endpoint endpointUpdReq.EPCommonName = containerInfo.Name endpointUpdReq.Labels = make(map[string]string) for k, v := range labelMap { endpointUpdReq.Labels[k] = v } } var epUpdResp master.UpdateEndpointResponse log.Infof("Sending Endpoint update request to master: {%+v}", endpointUpdReq) err = cluster.MasterPostReq("/plugin/updateEndpoint", endpointUpdReq, &epUpdResp) if err != nil { log.Errorf("Event: 'start' , Http error posting endpoint update, Error:%s", err) } } else { log.Errorf("Unable to fetch container labels for container %s ", event.ID) } case "die": endpointUpdReq := &master.UpdateEndpointRequest{} endpointUpdReq.ContainerID = event.ID endpointUpdReq.Event = "die" var epUpdResp master.UpdateEndpointResponse log.Infof("Sending Endpoint update request to master: {%+v} on container delete", endpointUpdReq) err := cluster.MasterPostReq("/plugin/updateEndpoint", endpointUpdReq, &epUpdResp) if err != nil { log.Errorf("Event:'die' Http error posting endpoint update, Error:%s", err) } } } } }
[ "func", "(", "ag", "*", "Agent", ")", "handleDockerEvents", "(", "events", "<-", "chan", "events", ".", "Message", ",", "errs", "<-", "chan", "error", ")", "{", "for", "{", "select", "{", "case", "err", ":=", "<-", "errs", ":", "if", "err", "!=", "...
// Handles docker events monitored by dockerclient. Currently we only handle // container start and die event
[ "Handles", "docker", "events", "monitored", "by", "dockerclient", ".", "Currently", "we", "only", "handle", "container", "start", "and", "die", "event" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netplugin/agent/docker_event.go#L48-L131
7,823
contiv/netplugin
netplugin/agent/docker_event.go
getLabelsFromContainerInspect
func getLabelsFromContainerInspect(containerInfo *types.ContainerJSON) map[string]string { if containerInfo != nil && containerInfo.Config != nil { return containerInfo.Config.Labels } return nil }
go
func getLabelsFromContainerInspect(containerInfo *types.ContainerJSON) map[string]string { if containerInfo != nil && containerInfo.Config != nil { return containerInfo.Config.Labels } return nil }
[ "func", "getLabelsFromContainerInspect", "(", "containerInfo", "*", "types", ".", "ContainerJSON", ")", "map", "[", "string", "]", "string", "{", "if", "containerInfo", "!=", "nil", "&&", "containerInfo", ".", "Config", "!=", "nil", "{", "return", "containerInfo...
//getLabelsFromContainerInspect returns the labels associated with the container
[ "getLabelsFromContainerInspect", "returns", "the", "labels", "associated", "with", "the", "container" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netplugin/agent/docker_event.go#L134-L139
7,824
contiv/netplugin
netplugin/agent/docker_event.go
getTenantFromContainerInspect
func getTenantFromContainerInspect(containerInfo *types.ContainerJSON) string { tenant := "default" if containerInfo != nil && containerInfo.NetworkSettings != nil { for network := range containerInfo.NetworkSettings.Networks { if strings.Contains(network, "/") { //network name is of the form networkname/tenantname for non default tenant tenant = strings.Split(network, "/")[1] } } } return tenant }
go
func getTenantFromContainerInspect(containerInfo *types.ContainerJSON) string { tenant := "default" if containerInfo != nil && containerInfo.NetworkSettings != nil { for network := range containerInfo.NetworkSettings.Networks { if strings.Contains(network, "/") { //network name is of the form networkname/tenantname for non default tenant tenant = strings.Split(network, "/")[1] } } } return tenant }
[ "func", "getTenantFromContainerInspect", "(", "containerInfo", "*", "types", ".", "ContainerJSON", ")", "string", "{", "tenant", ":=", "\"", "\"", "\n", "if", "containerInfo", "!=", "nil", "&&", "containerInfo", ".", "NetworkSettings", "!=", "nil", "{", "for", ...
//getTenantFromContainerInspect returns the tenant the container belongs to.
[ "getTenantFromContainerInspect", "returns", "the", "tenant", "the", "container", "belongs", "to", "." ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netplugin/agent/docker_event.go#L142-L153
7,825
contiv/netplugin
drivers/vppd/vppdriver.go
Init
func (d *VppDriver) Init(info *core.InstanceInfo) error { log.Infof("Initializing vppdriver") return nil }
go
func (d *VppDriver) Init(info *core.InstanceInfo) error { log.Infof("Initializing vppdriver") return nil }
[ "func", "(", "d", "*", "VppDriver", ")", "Init", "(", "info", "*", "core", ".", "InstanceInfo", ")", "error", "{", "log", ".", "Infof", "(", "\"", "\"", ")", "\n\n", "return", "nil", "\n", "}" ]
// Init is not implemented.
[ "Init", "is", "not", "implemented", "." ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/drivers/vppd/vppdriver.go#L66-L70
7,826
contiv/netplugin
drivers/vppd/vppdriver.go
DeleteEndpoint
func (d *VppDriver) DeleteEndpoint(id string) (err error) { log.Infof("Not implemented") return nil }
go
func (d *VppDriver) DeleteEndpoint(id string) (err error) { log.Infof("Not implemented") return nil }
[ "func", "(", "d", "*", "VppDriver", ")", "DeleteEndpoint", "(", "id", "string", ")", "(", "err", "error", ")", "{", "log", ".", "Infof", "(", "\"", "\"", ")", "\n", "return", "nil", "\n", "}" ]
// DeleteEndpoint is not implemented.
[ "DeleteEndpoint", "is", "not", "implemented", "." ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/drivers/vppd/vppdriver.go#L103-L106
7,827
contiv/netplugin
drivers/vppd/vppdriver.go
AddPeerHost
func (d *VppDriver) AddPeerHost(node core.ServiceInfo) error { log.Infof("Not implemented") return nil }
go
func (d *VppDriver) AddPeerHost(node core.ServiceInfo) error { log.Infof("Not implemented") return nil }
[ "func", "(", "d", "*", "VppDriver", ")", "AddPeerHost", "(", "node", "core", ".", "ServiceInfo", ")", "error", "{", "log", ".", "Infof", "(", "\"", "\"", ")", "\n", "return", "nil", "\n", "}" ]
// AddPeerHost is not implemented.
[ "AddPeerHost", "is", "not", "implemented", "." ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/drivers/vppd/vppdriver.go#L133-L136
7,828
contiv/netplugin
drivers/vppd/vppdriver.go
GlobalConfigUpdate
func (d *VppDriver) GlobalConfigUpdate(inst core.InstanceInfo) error { log.Infof("Not implemented") return nil }
go
func (d *VppDriver) GlobalConfigUpdate(inst core.InstanceInfo) error { log.Infof("Not implemented") return nil }
[ "func", "(", "d", "*", "VppDriver", ")", "GlobalConfigUpdate", "(", "inst", "core", ".", "InstanceInfo", ")", "error", "{", "log", ".", "Infof", "(", "\"", "\"", ")", "\n", "return", "nil", "\n", "}" ]
// GlobalConfigUpdate is not implemented
[ "GlobalConfigUpdate", "is", "not", "implemented" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/drivers/vppd/vppdriver.go#L203-L206
7,829
contiv/netplugin
netmaster/master/api.go
ReleaseAddressHandler
func ReleaseAddressHandler(w http.ResponseWriter, r *http.Request, vars map[string]string) (interface{}, error) { var relReq AddressReleaseRequest var networkID string var epgName string var epgCfg *mastercfg.EndpointGroupState // Get object from the request err := json.NewDecoder(r.Body).Decode(&relReq) if err != nil { log.Errorf("Error decoding ReleaseAddressHandler. Err %v", err) return nil, err } log.Infof("Received AddressReleaseRequest: %+v", relReq) stateDriver, err := utils.GetStateDriver() if err != nil { return nil, err } networkID, epgName = getNwAndEpgFromAddrReq(relReq.NetworkID) if len(epgName) > 0 { epgCfg = &mastercfg.EndpointGroupState{} epgCfg.StateDriver = stateDriver if err = epgCfg.Read(epgName); err != nil { log.Errorf("failed to read epg %s, %s", epgName, err) return nil, err } log.Infof("AddressReleaseRequest for network: %s epg: %s", networkID, epgName) } // find the network from network id nwCfg := &mastercfg.CfgNetworkState{} nwCfg.StateDriver = stateDriver err = nwCfg.Read(networkID) if err != nil { log.Errorf("network %s is not operational", relReq.NetworkID) return nil, err } // release addresses err = networkReleaseAddress(nwCfg, epgCfg, relReq.IPv4Address) if err != nil { log.Errorf("Failed to release address. Err: %v", err) return nil, err } return "success", nil }
go
func ReleaseAddressHandler(w http.ResponseWriter, r *http.Request, vars map[string]string) (interface{}, error) { var relReq AddressReleaseRequest var networkID string var epgName string var epgCfg *mastercfg.EndpointGroupState // Get object from the request err := json.NewDecoder(r.Body).Decode(&relReq) if err != nil { log.Errorf("Error decoding ReleaseAddressHandler. Err %v", err) return nil, err } log.Infof("Received AddressReleaseRequest: %+v", relReq) stateDriver, err := utils.GetStateDriver() if err != nil { return nil, err } networkID, epgName = getNwAndEpgFromAddrReq(relReq.NetworkID) if len(epgName) > 0 { epgCfg = &mastercfg.EndpointGroupState{} epgCfg.StateDriver = stateDriver if err = epgCfg.Read(epgName); err != nil { log.Errorf("failed to read epg %s, %s", epgName, err) return nil, err } log.Infof("AddressReleaseRequest for network: %s epg: %s", networkID, epgName) } // find the network from network id nwCfg := &mastercfg.CfgNetworkState{} nwCfg.StateDriver = stateDriver err = nwCfg.Read(networkID) if err != nil { log.Errorf("network %s is not operational", relReq.NetworkID) return nil, err } // release addresses err = networkReleaseAddress(nwCfg, epgCfg, relReq.IPv4Address) if err != nil { log.Errorf("Failed to release address. Err: %v", err) return nil, err } return "success", nil }
[ "func", "ReleaseAddressHandler", "(", "w", "http", ".", "ResponseWriter", ",", "r", "*", "http", ".", "Request", ",", "vars", "map", "[", "string", "]", "string", ")", "(", "interface", "{", "}", ",", "error", ")", "{", "var", "relReq", "AddressReleaseRe...
// ReleaseAddressHandler releases addresses
[ "ReleaseAddressHandler", "releases", "addresses" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netmaster/master/api.go#L275-L323
7,830
contiv/netplugin
netmaster/master/api.go
CreateEndpointHandler
func CreateEndpointHandler(w http.ResponseWriter, r *http.Request, vars map[string]string) (interface{}, error) { var epReq CreateEndpointRequest // Get object from the request err := json.NewDecoder(r.Body).Decode(&epReq) if err != nil { log.Errorf("Error decoding AllocAddressHandler. Err %v", err) return nil, err } log.Infof("Received CreateEndpointRequest: %+v", epReq) // Take a global lock for address allocation addrMutex.Lock() defer addrMutex.Unlock() // Gte the state driver stateDriver, err := utils.GetStateDriver() if err != nil { return nil, err } // find the network from network id netID := epReq.NetworkName + "." + epReq.TenantName nwCfg := &mastercfg.CfgNetworkState{} nwCfg.StateDriver = stateDriver err = nwCfg.Read(netID) if err != nil { log.Errorf("network %s is not operational", netID) return nil, err } // Create the endpoint epCfg, err := CreateEndpoint(stateDriver, nwCfg, &epReq) if err != nil { log.Errorf("CreateEndpoint failure for ep: %v. Err: %v", epReq.ConfigEP, err) return nil, err } // build ep create response epResp := CreateEndpointResponse{ EndpointConfig: *epCfg, } // return the response return epResp, nil }
go
func CreateEndpointHandler(w http.ResponseWriter, r *http.Request, vars map[string]string) (interface{}, error) { var epReq CreateEndpointRequest // Get object from the request err := json.NewDecoder(r.Body).Decode(&epReq) if err != nil { log.Errorf("Error decoding AllocAddressHandler. Err %v", err) return nil, err } log.Infof("Received CreateEndpointRequest: %+v", epReq) // Take a global lock for address allocation addrMutex.Lock() defer addrMutex.Unlock() // Gte the state driver stateDriver, err := utils.GetStateDriver() if err != nil { return nil, err } // find the network from network id netID := epReq.NetworkName + "." + epReq.TenantName nwCfg := &mastercfg.CfgNetworkState{} nwCfg.StateDriver = stateDriver err = nwCfg.Read(netID) if err != nil { log.Errorf("network %s is not operational", netID) return nil, err } // Create the endpoint epCfg, err := CreateEndpoint(stateDriver, nwCfg, &epReq) if err != nil { log.Errorf("CreateEndpoint failure for ep: %v. Err: %v", epReq.ConfigEP, err) return nil, err } // build ep create response epResp := CreateEndpointResponse{ EndpointConfig: *epCfg, } // return the response return epResp, nil }
[ "func", "CreateEndpointHandler", "(", "w", "http", ".", "ResponseWriter", ",", "r", "*", "http", ".", "Request", ",", "vars", "map", "[", "string", "]", "string", ")", "(", "interface", "{", "}", ",", "error", ")", "{", "var", "epReq", "CreateEndpointReq...
// CreateEndpointHandler handles create endpoint requests
[ "CreateEndpointHandler", "handles", "create", "endpoint", "requests" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netmaster/master/api.go#L326-L371
7,831
contiv/netplugin
netmaster/master/api.go
DeleteEndpointHandler
func DeleteEndpointHandler(w http.ResponseWriter, r *http.Request, vars map[string]string) (interface{}, error) { var epdelReq DeleteEndpointRequest // Get object from the request err := json.NewDecoder(r.Body).Decode(&epdelReq) if err != nil { log.Errorf("Error decoding AllocAddressHandler. Err %v", err) return nil, err } log.Infof("Received DeleteEndpointRequest: %+v", epdelReq) // Get the state driver stateDriver, err := utils.GetStateDriver() if err != nil { return nil, err } // Take a global lock for address release addrMutex.Lock() defer addrMutex.Unlock() // build the endpoint ID netID := epdelReq.NetworkName + "." + epdelReq.TenantName epID := getEpName(netID, &intent.ConfigEP{Container: epdelReq.EndpointID}) // delete the endpoint epCfg, err := DeleteEndpointID(stateDriver, epID) if err != nil { log.Errorf("Error deleting endpoint: %v", epID) return nil, err } // build the response delResp := DeleteEndpointResponse{ EndpointConfig: *epCfg, } // done. return resp return delResp, nil }
go
func DeleteEndpointHandler(w http.ResponseWriter, r *http.Request, vars map[string]string) (interface{}, error) { var epdelReq DeleteEndpointRequest // Get object from the request err := json.NewDecoder(r.Body).Decode(&epdelReq) if err != nil { log.Errorf("Error decoding AllocAddressHandler. Err %v", err) return nil, err } log.Infof("Received DeleteEndpointRequest: %+v", epdelReq) // Get the state driver stateDriver, err := utils.GetStateDriver() if err != nil { return nil, err } // Take a global lock for address release addrMutex.Lock() defer addrMutex.Unlock() // build the endpoint ID netID := epdelReq.NetworkName + "." + epdelReq.TenantName epID := getEpName(netID, &intent.ConfigEP{Container: epdelReq.EndpointID}) // delete the endpoint epCfg, err := DeleteEndpointID(stateDriver, epID) if err != nil { log.Errorf("Error deleting endpoint: %v", epID) return nil, err } // build the response delResp := DeleteEndpointResponse{ EndpointConfig: *epCfg, } // done. return resp return delResp, nil }
[ "func", "DeleteEndpointHandler", "(", "w", "http", ".", "ResponseWriter", ",", "r", "*", "http", ".", "Request", ",", "vars", "map", "[", "string", "]", "string", ")", "(", "interface", "{", "}", ",", "error", ")", "{", "var", "epdelReq", "DeleteEndpoint...
// DeleteEndpointHandler handles delete endpoint requests
[ "DeleteEndpointHandler", "handles", "delete", "endpoint", "requests" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netmaster/master/api.go#L374-L414
7,832
contiv/netplugin
mgmtfn/mesosplugin/cniserver.go
parseCniArgs
func (cniReq *cniServer) parseCniArgs(httpBody []byte) error { if err := json.Unmarshal(httpBody, &cniReq.pluginArgs); err != nil { return fmt.Errorf("failed to parse JSON req: %s", err.Error()) } cniLog.Debugf("parsed ifname: %s, netns: %s, container-id: %s,"+ "tenant: %s, network-name: %s, network-group: %s", cniReq.pluginArgs.CniIfname, cniReq.pluginArgs.CniNetns, cniReq.pluginArgs.CniContainerid, cniReq.pluginArgs.Labels.TenantName, cniReq.pluginArgs.Labels.NetworkName, cniReq.pluginArgs.Labels.NetworkGroup) // set defaults cniReq.endPointLabels = map[string]string{cniapi.LabelNetworkName: "default-net", cniapi.LabelTenantName: "default"} for _, label := range []string{cniapi.LabelTenantName, cniapi.LabelNetworkName, cniapi.LabelNetworkGroup} { switch label { case cniapi.LabelTenantName: if len(cniReq.pluginArgs.Labels.TenantName) > 0 { cniReq.endPointLabels[label] = cniReq.pluginArgs.Labels.TenantName } cniLog.Infof("netplugin label %s = %s", cniapi.LabelTenantName, cniReq.endPointLabels[label]) case cniapi.LabelNetworkName: if len(cniReq.pluginArgs.Labels.NetworkName) > 0 { cniReq.endPointLabels[label] = cniReq.pluginArgs.Labels.NetworkName } cniLog.Infof("netplugin label %s = %s", cniapi.LabelNetworkName, cniReq.endPointLabels[label]) case cniapi.LabelNetworkGroup: if len(cniReq.pluginArgs.Labels.NetworkGroup) > 0 { cniReq.endPointLabels[label] = cniReq.pluginArgs.Labels.NetworkGroup } cniLog.Infof("netplugin label %s = %s", cniapi.LabelNetworkGroup, cniReq.endPointLabels[label]) } } cniReq.networkID = cniReq.endPointLabels[cniapi.LabelNetworkName] + "." + cniReq.endPointLabels[cniapi.LabelTenantName] cniLog.Infof("network fdn %s", cniReq.networkID) cniReq.endpointID = cniReq.networkID + "-" + cniReq.pluginArgs.CniContainerid cniLog.Infof("endpoint fdn %s", cniReq.endpointID) return nil }
go
func (cniReq *cniServer) parseCniArgs(httpBody []byte) error { if err := json.Unmarshal(httpBody, &cniReq.pluginArgs); err != nil { return fmt.Errorf("failed to parse JSON req: %s", err.Error()) } cniLog.Debugf("parsed ifname: %s, netns: %s, container-id: %s,"+ "tenant: %s, network-name: %s, network-group: %s", cniReq.pluginArgs.CniIfname, cniReq.pluginArgs.CniNetns, cniReq.pluginArgs.CniContainerid, cniReq.pluginArgs.Labels.TenantName, cniReq.pluginArgs.Labels.NetworkName, cniReq.pluginArgs.Labels.NetworkGroup) // set defaults cniReq.endPointLabels = map[string]string{cniapi.LabelNetworkName: "default-net", cniapi.LabelTenantName: "default"} for _, label := range []string{cniapi.LabelTenantName, cniapi.LabelNetworkName, cniapi.LabelNetworkGroup} { switch label { case cniapi.LabelTenantName: if len(cniReq.pluginArgs.Labels.TenantName) > 0 { cniReq.endPointLabels[label] = cniReq.pluginArgs.Labels.TenantName } cniLog.Infof("netplugin label %s = %s", cniapi.LabelTenantName, cniReq.endPointLabels[label]) case cniapi.LabelNetworkName: if len(cniReq.pluginArgs.Labels.NetworkName) > 0 { cniReq.endPointLabels[label] = cniReq.pluginArgs.Labels.NetworkName } cniLog.Infof("netplugin label %s = %s", cniapi.LabelNetworkName, cniReq.endPointLabels[label]) case cniapi.LabelNetworkGroup: if len(cniReq.pluginArgs.Labels.NetworkGroup) > 0 { cniReq.endPointLabels[label] = cniReq.pluginArgs.Labels.NetworkGroup } cniLog.Infof("netplugin label %s = %s", cniapi.LabelNetworkGroup, cniReq.endPointLabels[label]) } } cniReq.networkID = cniReq.endPointLabels[cniapi.LabelNetworkName] + "." + cniReq.endPointLabels[cniapi.LabelTenantName] cniLog.Infof("network fdn %s", cniReq.networkID) cniReq.endpointID = cniReq.networkID + "-" + cniReq.pluginArgs.CniContainerid cniLog.Infof("endpoint fdn %s", cniReq.endpointID) return nil }
[ "func", "(", "cniReq", "*", "cniServer", ")", "parseCniArgs", "(", "httpBody", "[", "]", "byte", ")", "error", "{", "if", "err", ":=", "json", ".", "Unmarshal", "(", "httpBody", ",", "&", "cniReq", ".", "pluginArgs", ")", ";", "err", "!=", "nil", "{"...
// parse & save labels
[ "parse", "&", "save", "labels" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/mgmtfn/mesosplugin/cniserver.go#L95-L147
7,833
contiv/netplugin
mgmtfn/mesosplugin/cniserver.go
InitPlugin
func InitPlugin(netPlugin *plugin.NetPlugin) { cniLog = log.WithField("plugin", "mesos") cniLog.Infof("starting Mesos CNI server") router := mux.NewRouter() // register handlers for cni plugin subRtr := router.Headers("Content-Type", "application/json").Subrouter() subRtr.HandleFunc(cniapi.MesosNwIntfAdd, httpWrapper(mesosNwIntfAdd)).Methods("POST") subRtr.HandleFunc(cniapi.MesosNwIntfDel, httpWrapper(mesosNwIntfDel)).Methods("POST") router.HandleFunc("/{*}", unknownReq) sockFile := cniapi.ContivMesosSocket os.Remove(sockFile) os.MkdirAll(cniapi.PluginPath, 0700) cniDriverInit(netPlugin) go func() { lsock, err := net.ListenUnix("unix", &net.UnixAddr{Name: sockFile, Net: "unix"}) if err != nil { cniLog.Errorf("Mesos CNI server failed: %s", err) return } cniLog.Infof("Mesos CNI server is listening on %s", sockFile) http.Serve(lsock, router) lsock.Close() cniLog.Infof("Mesos CNI server socket %s closed ", sockFile) }() }
go
func InitPlugin(netPlugin *plugin.NetPlugin) { cniLog = log.WithField("plugin", "mesos") cniLog.Infof("starting Mesos CNI server") router := mux.NewRouter() // register handlers for cni plugin subRtr := router.Headers("Content-Type", "application/json").Subrouter() subRtr.HandleFunc(cniapi.MesosNwIntfAdd, httpWrapper(mesosNwIntfAdd)).Methods("POST") subRtr.HandleFunc(cniapi.MesosNwIntfDel, httpWrapper(mesosNwIntfDel)).Methods("POST") router.HandleFunc("/{*}", unknownReq) sockFile := cniapi.ContivMesosSocket os.Remove(sockFile) os.MkdirAll(cniapi.PluginPath, 0700) cniDriverInit(netPlugin) go func() { lsock, err := net.ListenUnix("unix", &net.UnixAddr{Name: sockFile, Net: "unix"}) if err != nil { cniLog.Errorf("Mesos CNI server failed: %s", err) return } cniLog.Infof("Mesos CNI server is listening on %s", sockFile) http.Serve(lsock, router) lsock.Close() cniLog.Infof("Mesos CNI server socket %s closed ", sockFile) }() }
[ "func", "InitPlugin", "(", "netPlugin", "*", "plugin", ".", "NetPlugin", ")", "{", "cniLog", "=", "log", ".", "WithField", "(", "\"", "\"", ",", "\"", "\"", ")", "\n", "cniLog", ".", "Infof", "(", "\"", "\"", ")", "\n", "router", ":=", "mux", ".", ...
// InitPlugin registers REST endpoints to handle requests from Mesos CNI plugins
[ "InitPlugin", "registers", "REST", "endpoints", "to", "handle", "requests", "from", "Mesos", "CNI", "plugins" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/mgmtfn/mesosplugin/cniserver.go#L191-L221
7,834
contiv/netplugin
objdb/objdb.go
RegisterPlugin
func RegisterPlugin(name string, plugin Plugin) error { pluginMutex.Lock() defer pluginMutex.Unlock() pluginList[name] = plugin return nil }
go
func RegisterPlugin(name string, plugin Plugin) error { pluginMutex.Lock() defer pluginMutex.Unlock() pluginList[name] = plugin return nil }
[ "func", "RegisterPlugin", "(", "name", "string", ",", "plugin", "Plugin", ")", "error", "{", "pluginMutex", ".", "Lock", "(", ")", "\n", "defer", "pluginMutex", ".", "Unlock", "(", ")", "\n", "pluginList", "[", "name", "]", "=", "plugin", "\n\n", "return...
// RegisterPlugin Register a plugin
[ "RegisterPlugin", "Register", "a", "plugin" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/objdb/objdb.go#L121-L127
7,835
contiv/netplugin
objdb/objdb.go
GetPlugin
func GetPlugin(name string) Plugin { // Find the conf store pluginMutex.Lock() defer pluginMutex.Unlock() if pluginList[name] == nil { log.Errorf("Objdb Plugin %s not registered", name) return nil } return pluginList[name] }
go
func GetPlugin(name string) Plugin { // Find the conf store pluginMutex.Lock() defer pluginMutex.Unlock() if pluginList[name] == nil { log.Errorf("Objdb Plugin %s not registered", name) return nil } return pluginList[name] }
[ "func", "GetPlugin", "(", "name", "string", ")", "Plugin", "{", "// Find the conf store", "pluginMutex", ".", "Lock", "(", ")", "\n", "defer", "pluginMutex", ".", "Unlock", "(", ")", "\n", "if", "pluginList", "[", "name", "]", "==", "nil", "{", "log", "....
// GetPlugin returns the plugin by name
[ "GetPlugin", "returns", "the", "plugin", "by", "name" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/objdb/objdb.go#L130-L140
7,836
contiv/netplugin
objdb/client.go
InitClient
func InitClient(storeName string, storeURLs []string) (API, error) { plugin := GetPlugin(storeName) if plugin == nil { log.Errorf("Invalid DB type %s", storeName) return nil, errors.New("unsupported DB type") } cl, err := plugin.NewClient(storeURLs) if err != nil { log.Errorf("Error creating client %s to url %v. Err: %v", storeName, storeURLs, err) return nil, err } return cl, nil }
go
func InitClient(storeName string, storeURLs []string) (API, error) { plugin := GetPlugin(storeName) if plugin == nil { log.Errorf("Invalid DB type %s", storeName) return nil, errors.New("unsupported DB type") } cl, err := plugin.NewClient(storeURLs) if err != nil { log.Errorf("Error creating client %s to url %v. Err: %v", storeName, storeURLs, err) return nil, err } return cl, nil }
[ "func", "InitClient", "(", "storeName", "string", ",", "storeURLs", "[", "]", "string", ")", "(", "API", ",", "error", ")", "{", "plugin", ":=", "GetPlugin", "(", "storeName", ")", "\n", "if", "plugin", "==", "nil", "{", "log", ".", "Errorf", "(", "\...
// InitClient aims to support multi endpoints
[ "InitClient", "aims", "to", "support", "multi", "endpoints" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/objdb/client.go#L28-L40
7,837
contiv/netplugin
objdb/client.go
NewClient
func NewClient(dbURL string) (API, error) { // check if we should use default db if dbURL == "" { dbURL = defaultDbURL } parts := strings.Split(dbURL, "://") if len(parts) < 2 { log.Errorf("Invalid DB URL format %s", dbURL) return nil, errors.New("invalid DB URL") } clientName := parts[0] clientURL := parts[1] return InitClient(clientName, []string{"http://" + clientURL}) }
go
func NewClient(dbURL string) (API, error) { // check if we should use default db if dbURL == "" { dbURL = defaultDbURL } parts := strings.Split(dbURL, "://") if len(parts) < 2 { log.Errorf("Invalid DB URL format %s", dbURL) return nil, errors.New("invalid DB URL") } clientName := parts[0] clientURL := parts[1] return InitClient(clientName, []string{"http://" + clientURL}) }
[ "func", "NewClient", "(", "dbURL", "string", ")", "(", "API", ",", "error", ")", "{", "// check if we should use default db", "if", "dbURL", "==", "\"", "\"", "{", "dbURL", "=", "defaultDbURL", "\n", "}", "\n\n", "parts", ":=", "strings", ".", "Split", "("...
// NewClient Create a new conf store
[ "NewClient", "Create", "a", "new", "conf", "store" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/objdb/client.go#L43-L58
7,838
contiv/netplugin
netmaster/docknet/docknet.go
GetDocknetName
func GetDocknetName(tenantName, networkName, epgName string) string { netName := "" // if epg is specified, always use that, else use nw if epgName == "" { netName = networkName } else { netName = epgName } // add tenant suffix if not the default tenant if tenantName != defaultTenantName { netName = netName + "/" + tenantName } return netName }
go
func GetDocknetName(tenantName, networkName, epgName string) string { netName := "" // if epg is specified, always use that, else use nw if epgName == "" { netName = networkName } else { netName = epgName } // add tenant suffix if not the default tenant if tenantName != defaultTenantName { netName = netName + "/" + tenantName } return netName }
[ "func", "GetDocknetName", "(", "tenantName", ",", "networkName", ",", "epgName", "string", ")", "string", "{", "netName", ":=", "\"", "\"", "\n", "// if epg is specified, always use that, else use nw", "if", "epgName", "==", "\"", "\"", "{", "netName", "=", "netwo...
// GetDocknetName trims default tenant from network name
[ "GetDocknetName", "trims", "default", "tenant", "from", "network", "name" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netmaster/docknet/docknet.go#L86-L102
7,839
contiv/netplugin
netmaster/docknet/docknet.go
UpdateDockerV2PluginName
func UpdateDockerV2PluginName(netDriver string, ipamDriver string) { log.Infof("docker v2plugin (%s) updated to %s and ipam (%s) updated to %s", netDriverName, netDriver, ipamDriverName, ipamDriver) netDriverName = netDriver ipamDriverName = ipamDriver }
go
func UpdateDockerV2PluginName(netDriver string, ipamDriver string) { log.Infof("docker v2plugin (%s) updated to %s and ipam (%s) updated to %s", netDriverName, netDriver, ipamDriverName, ipamDriver) netDriverName = netDriver ipamDriverName = ipamDriver }
[ "func", "UpdateDockerV2PluginName", "(", "netDriver", "string", ",", "ipamDriver", "string", ")", "{", "log", ".", "Infof", "(", "\"", "\"", ",", "netDriverName", ",", "netDriver", ",", "ipamDriverName", ",", "ipamDriver", ")", "\n", "netDriverName", "=", "net...
// UpdateDockerV2PluginName update the docker v2 plugin name
[ "UpdateDockerV2PluginName", "update", "the", "docker", "v2", "plugin", "name" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netmaster/docknet/docknet.go#L105-L110
7,840
contiv/netplugin
netmaster/docknet/docknet.go
DeleteDockNet
func DeleteDockNet(tenantName, networkName, serviceName string) error { // Trim default tenant name docknetName := GetDocknetName(tenantName, networkName, serviceName) // connect to docker defaultHeaders := map[string]string{"User-Agent": "Docker-Client/" + dockerversion.Version + " (" + runtime.GOOS + ")"} docker, err := dockerclient.NewClient("unix:///var/run/docker.sock", "v1.23", nil, defaultHeaders) if err != nil { log.Errorf("Unable to connect to docker. Error %v", err) return errors.New("unable to connect to docker") } // check whether the network is present in docker _, err = docker.NetworkInspect(context.Background(), docknetName) if err != nil { log.Warnf("Couldnt find network %s in docker", docknetName) } docknetDeleted := (err != nil) log.Infof("Deleting docker network: %+v", docknetName) // Delete network err = docker.NetworkRemove(context.Background(), docknetName) if err != nil { if !docknetDeleted { log.Errorf("Error deleting network %s. Err: %v", docknetName, err) return err } // since it was already deleted from docker ignore the error log.Infof("Ignoring error in deleting docker network %s. Err: %v", docknetName, err) } err = DeleteDockNetState(tenantName, networkName, serviceName) if docknetDeleted && strings.Contains(err.Error(), "key not found") { // Ignore the error as docknet was already deleted err = nil } return err }
go
func DeleteDockNet(tenantName, networkName, serviceName string) error { // Trim default tenant name docknetName := GetDocknetName(tenantName, networkName, serviceName) // connect to docker defaultHeaders := map[string]string{"User-Agent": "Docker-Client/" + dockerversion.Version + " (" + runtime.GOOS + ")"} docker, err := dockerclient.NewClient("unix:///var/run/docker.sock", "v1.23", nil, defaultHeaders) if err != nil { log.Errorf("Unable to connect to docker. Error %v", err) return errors.New("unable to connect to docker") } // check whether the network is present in docker _, err = docker.NetworkInspect(context.Background(), docknetName) if err != nil { log.Warnf("Couldnt find network %s in docker", docknetName) } docknetDeleted := (err != nil) log.Infof("Deleting docker network: %+v", docknetName) // Delete network err = docker.NetworkRemove(context.Background(), docknetName) if err != nil { if !docknetDeleted { log.Errorf("Error deleting network %s. Err: %v", docknetName, err) return err } // since it was already deleted from docker ignore the error log.Infof("Ignoring error in deleting docker network %s. Err: %v", docknetName, err) } err = DeleteDockNetState(tenantName, networkName, serviceName) if docknetDeleted && strings.Contains(err.Error(), "key not found") { // Ignore the error as docknet was already deleted err = nil } return err }
[ "func", "DeleteDockNet", "(", "tenantName", ",", "networkName", ",", "serviceName", "string", ")", "error", "{", "// Trim default tenant name", "docknetName", ":=", "GetDocknetName", "(", "tenantName", ",", "networkName", ",", "serviceName", ")", "\n\n", "// connect t...
// DeleteDockNet deletes a network in docker daemon
[ "DeleteDockNet", "deletes", "a", "network", "in", "docker", "daemon" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netmaster/docknet/docknet.go#L206-L244
7,841
contiv/netplugin
netmaster/docknet/docknet.go
CreateDockNetState
func CreateDockNetState(tenantName, networkName, serviceName, docknetID string) error { log.Infof("Adding DockNetState for %s.%s.%s --> %s", tenantName, networkName, serviceName, docknetID) // Get the state driver stateDriver, err := utils.GetStateDriver() if err != nil { log.Warnf("Couldn't get state driver for docknet add %v", err) return err } // save docknet oper state dnetOper := DnetOperState{ TenantName: tenantName, NetworkName: networkName, ServiceName: serviceName, DocknetUUID: docknetID, } dnetOper.ID = fmt.Sprintf("%s.%s.%s", tenantName, networkName, serviceName) dnetOper.StateDriver = stateDriver // write the dnet oper state return dnetOper.Write() }
go
func CreateDockNetState(tenantName, networkName, serviceName, docknetID string) error { log.Infof("Adding DockNetState for %s.%s.%s --> %s", tenantName, networkName, serviceName, docknetID) // Get the state driver stateDriver, err := utils.GetStateDriver() if err != nil { log.Warnf("Couldn't get state driver for docknet add %v", err) return err } // save docknet oper state dnetOper := DnetOperState{ TenantName: tenantName, NetworkName: networkName, ServiceName: serviceName, DocknetUUID: docknetID, } dnetOper.ID = fmt.Sprintf("%s.%s.%s", tenantName, networkName, serviceName) dnetOper.StateDriver = stateDriver // write the dnet oper state return dnetOper.Write() }
[ "func", "CreateDockNetState", "(", "tenantName", ",", "networkName", ",", "serviceName", ",", "docknetID", "string", ")", "error", "{", "log", ".", "Infof", "(", "\"", "\"", ",", "tenantName", ",", "networkName", ",", "serviceName", ",", "docknetID", ")", "\...
// CreateDockNetState creates an entry in the docknet state store
[ "CreateDockNetState", "creates", "an", "entry", "in", "the", "docknet", "state", "store" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netmaster/docknet/docknet.go#L247-L269
7,842
contiv/netplugin
netmaster/docknet/docknet.go
DeleteDockNetState
func DeleteDockNetState(tenantName, networkName, serviceName string) error { log.Infof("Deleting DockNetState for %s.%s.%s", tenantName, networkName, serviceName) // Get the state driver stateDriver, err := utils.GetStateDriver() if err != nil { log.Warnf("Couldn't get state driver for docknet del %v", err) return err } // save docknet oper state dnetOper := DnetOperState{} dnetOper.ID = fmt.Sprintf("%s.%s.%s", tenantName, networkName, serviceName) dnetOper.StateDriver = stateDriver // write the dnet oper state return dnetOper.Clear() }
go
func DeleteDockNetState(tenantName, networkName, serviceName string) error { log.Infof("Deleting DockNetState for %s.%s.%s", tenantName, networkName, serviceName) // Get the state driver stateDriver, err := utils.GetStateDriver() if err != nil { log.Warnf("Couldn't get state driver for docknet del %v", err) return err } // save docknet oper state dnetOper := DnetOperState{} dnetOper.ID = fmt.Sprintf("%s.%s.%s", tenantName, networkName, serviceName) dnetOper.StateDriver = stateDriver // write the dnet oper state return dnetOper.Clear() }
[ "func", "DeleteDockNetState", "(", "tenantName", ",", "networkName", ",", "serviceName", "string", ")", "error", "{", "log", ".", "Infof", "(", "\"", "\"", ",", "tenantName", ",", "networkName", ",", "serviceName", ")", "\n\n", "// Get the state driver", "stateD...
// DeleteDockNetState delete the docknet entry from state store
[ "DeleteDockNetState", "delete", "the", "docknet", "entry", "from", "state", "store" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netmaster/docknet/docknet.go#L272-L289
7,843
contiv/netplugin
netmaster/docknet/docknet.go
GetDocknetState
func GetDocknetState(tenantName, networkName, serviceName string) (*DnetOperState, error) { log.Infof("GetDocknetState for %s.%s.%s", tenantName, networkName, serviceName) // Get the state driver stateDriver, err := utils.GetStateDriver() if err != nil { log.Warnf("Couldn't get state driver for docknet %v", err) return nil, err } // save docknet oper state dnetOper := DnetOperState{} dnetOper.ID = fmt.Sprintf("%s.%s.%s", tenantName, networkName, serviceName) dnetOper.StateDriver = stateDriver // Read the dnet oper state err = dnetOper.Read(dnetOper.ID) if err == nil { return &dnetOper, nil } return nil, err }
go
func GetDocknetState(tenantName, networkName, serviceName string) (*DnetOperState, error) { log.Infof("GetDocknetState for %s.%s.%s", tenantName, networkName, serviceName) // Get the state driver stateDriver, err := utils.GetStateDriver() if err != nil { log.Warnf("Couldn't get state driver for docknet %v", err) return nil, err } // save docknet oper state dnetOper := DnetOperState{} dnetOper.ID = fmt.Sprintf("%s.%s.%s", tenantName, networkName, serviceName) dnetOper.StateDriver = stateDriver // Read the dnet oper state err = dnetOper.Read(dnetOper.ID) if err == nil { return &dnetOper, nil } return nil, err }
[ "func", "GetDocknetState", "(", "tenantName", ",", "networkName", ",", "serviceName", "string", ")", "(", "*", "DnetOperState", ",", "error", ")", "{", "log", ".", "Infof", "(", "\"", "\"", ",", "tenantName", ",", "networkName", ",", "serviceName", ")", "\...
// GetDocknetState gets the docknet entry from state store
[ "GetDocknetState", "gets", "the", "docknet", "entry", "from", "state", "store" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netmaster/docknet/docknet.go#L292-L313
7,844
contiv/netplugin
netmaster/docknet/docknet.go
FindDocknetByUUID
func FindDocknetByUUID(dnetID string) (*DnetOperState, error) { log.Infof("find docker network '%s' ", dnetID) // Get the state driver stateDriver, err := utils.GetStateDriver() if err != nil { log.Warnf("Couldn't read global config %v", err) return nil, err } tmpDnet := DnetOperState{} tmpDnet.StateDriver = stateDriver dnetOperList, err := tmpDnet.ReadAll() if err != nil { log.Errorf("Error getting docknet list. Err: %v", err) return nil, err } // Walk all dnets and find the matching UUID for _, dnet := range dnetOperList { if dnet.(*DnetOperState).DocknetUUID == dnetID { return dnet.(*DnetOperState), nil } } return nil, errors.New("docknet UUID not found") }
go
func FindDocknetByUUID(dnetID string) (*DnetOperState, error) { log.Infof("find docker network '%s' ", dnetID) // Get the state driver stateDriver, err := utils.GetStateDriver() if err != nil { log.Warnf("Couldn't read global config %v", err) return nil, err } tmpDnet := DnetOperState{} tmpDnet.StateDriver = stateDriver dnetOperList, err := tmpDnet.ReadAll() if err != nil { log.Errorf("Error getting docknet list. Err: %v", err) return nil, err } // Walk all dnets and find the matching UUID for _, dnet := range dnetOperList { if dnet.(*DnetOperState).DocknetUUID == dnetID { return dnet.(*DnetOperState), nil } } return nil, errors.New("docknet UUID not found") }
[ "func", "FindDocknetByUUID", "(", "dnetID", "string", ")", "(", "*", "DnetOperState", ",", "error", ")", "{", "log", ".", "Infof", "(", "\"", "\"", ",", "dnetID", ")", "\n\n", "// Get the state driver", "stateDriver", ",", "err", ":=", "utils", ".", "GetSt...
// FindDocknetByUUID find the docknet by UUID
[ "FindDocknetByUUID", "find", "the", "docknet", "by", "UUID" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netmaster/docknet/docknet.go#L316-L342
7,845
contiv/netplugin
utils/k8sutils/k8sutils.go
GetK8SConfig
func GetK8SConfig(pCfg *ContivConfig) error { bytes, err := ioutil.ReadFile(contivKubeCfgFile) if err != nil { return err } pCfg.SvcSubnet = defSvcSubnet err = json.Unmarshal(bytes, pCfg) if err != nil { return fmt.Errorf("Error parsing config file: %s", err) } // If no client certs or token is specified, get the default token if len(strings.TrimSpace(pCfg.K8sCert)) == 0 && len(strings.TrimSpace(pCfg.K8sToken)) == 0 { pCfg.K8sToken, err = getDefaultToken() if err != nil { log.Errorf("Failed: %v", err) return err } } return nil }
go
func GetK8SConfig(pCfg *ContivConfig) error { bytes, err := ioutil.ReadFile(contivKubeCfgFile) if err != nil { return err } pCfg.SvcSubnet = defSvcSubnet err = json.Unmarshal(bytes, pCfg) if err != nil { return fmt.Errorf("Error parsing config file: %s", err) } // If no client certs or token is specified, get the default token if len(strings.TrimSpace(pCfg.K8sCert)) == 0 && len(strings.TrimSpace(pCfg.K8sToken)) == 0 { pCfg.K8sToken, err = getDefaultToken() if err != nil { log.Errorf("Failed: %v", err) return err } } return nil }
[ "func", "GetK8SConfig", "(", "pCfg", "*", "ContivConfig", ")", "error", "{", "bytes", ",", "err", ":=", "ioutil", ".", "ReadFile", "(", "contivKubeCfgFile", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "pCfg", ".", "Svc...
// GetK8SConfig reads and parses the contivKubeCfgFile
[ "GetK8SConfig", "reads", "and", "parses", "the", "contivKubeCfgFile" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/utils/k8sutils/k8sutils.go#L32-L54
7,846
contiv/netplugin
utils/k8sutils/k8sutils.go
SetUpK8SClient
func SetUpK8SClient() (*kubernetes.Clientset, error) { var contivK8sCfg ContivConfig err := GetK8SConfig(&contivK8sCfg) if err != nil { log.Errorf("Failed to get K8S config: %v", err) return nil, err } // init k8s client restCfg := &k8sRest.Config{ Host: contivK8sCfg.K8sAPIServer, BearerToken: contivK8sCfg.K8sToken, TLSClientConfig: k8sRest.TLSClientConfig{CAFile: contivK8sCfg.K8sCa}, } clientSet, err := kubernetes.NewForConfig(restCfg) if err != nil { log.Errorf("failed to create kubernetes client instance %s, %+v", err, restCfg) return nil, err } return clientSet, nil }
go
func SetUpK8SClient() (*kubernetes.Clientset, error) { var contivK8sCfg ContivConfig err := GetK8SConfig(&contivK8sCfg) if err != nil { log.Errorf("Failed to get K8S config: %v", err) return nil, err } // init k8s client restCfg := &k8sRest.Config{ Host: contivK8sCfg.K8sAPIServer, BearerToken: contivK8sCfg.K8sToken, TLSClientConfig: k8sRest.TLSClientConfig{CAFile: contivK8sCfg.K8sCa}, } clientSet, err := kubernetes.NewForConfig(restCfg) if err != nil { log.Errorf("failed to create kubernetes client instance %s, %+v", err, restCfg) return nil, err } return clientSet, nil }
[ "func", "SetUpK8SClient", "(", ")", "(", "*", "kubernetes", ".", "Clientset", ",", "error", ")", "{", "var", "contivK8sCfg", "ContivConfig", "\n", "err", ":=", "GetK8SConfig", "(", "&", "contivK8sCfg", ")", "\n", "if", "err", "!=", "nil", "{", "log", "."...
// SetUpK8SClient init K8S client
[ "SetUpK8SClient", "init", "K8S", "client" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/utils/k8sutils/k8sutils.go#L57-L78
7,847
contiv/netplugin
utils/k8sutils/k8sutils.go
getDefaultToken
func getDefaultToken() (string, error) { bytes, err := ioutil.ReadFile(tokenFile) if err != nil { log.Errorf("Failed: %v", err) return "", err } return string(bytes), nil }
go
func getDefaultToken() (string, error) { bytes, err := ioutil.ReadFile(tokenFile) if err != nil { log.Errorf("Failed: %v", err) return "", err } return string(bytes), nil }
[ "func", "getDefaultToken", "(", ")", "(", "string", ",", "error", ")", "{", "bytes", ",", "err", ":=", "ioutil", ".", "ReadFile", "(", "tokenFile", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", ...
// getDefaultToken gets the token to access kubernetes API Server // from the secrets loaded on the container
[ "getDefaultToken", "gets", "the", "token", "to", "access", "kubernetes", "API", "Server", "from", "the", "secrets", "loaded", "on", "the", "container" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/utils/k8sutils/k8sutils.go#L82-L89
7,848
contiv/netplugin
netmaster/master/network.go
CreateNetworks
func CreateNetworks(stateDriver core.StateDriver, tenant *intent.ConfigTenant) error { // Validate the config err := validateNetworkConfig(tenant) if err != nil { log.Errorf("error validating network config. Error: %s", err) return err } for _, network := range tenant.Networks { err = CreateNetwork(network, stateDriver, tenant.Name) if err != nil { log.Errorf("Error creating network {%+v}. Err: %v", network, err) return err } } return err }
go
func CreateNetworks(stateDriver core.StateDriver, tenant *intent.ConfigTenant) error { // Validate the config err := validateNetworkConfig(tenant) if err != nil { log.Errorf("error validating network config. Error: %s", err) return err } for _, network := range tenant.Networks { err = CreateNetwork(network, stateDriver, tenant.Name) if err != nil { log.Errorf("Error creating network {%+v}. Err: %v", network, err) return err } } return err }
[ "func", "CreateNetworks", "(", "stateDriver", "core", ".", "StateDriver", ",", "tenant", "*", "intent", ".", "ConfigTenant", ")", "error", "{", "// Validate the config", "err", ":=", "validateNetworkConfig", "(", "tenant", ")", "\n", "if", "err", "!=", "nil", ...
// CreateNetworks creates the necessary virtual networks for the tenant // provided by ConfigTenant.
[ "CreateNetworks", "creates", "the", "necessary", "virtual", "networks", "for", "the", "tenant", "provided", "by", "ConfigTenant", "." ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netmaster/master/network.go#L207-L224
7,849
contiv/netplugin
netmaster/master/network.go
DeleteNetworkID
func DeleteNetworkID(stateDriver core.StateDriver, netID string) error { nwCfg := &mastercfg.CfgNetworkState{} nwCfg.StateDriver = stateDriver err := nwCfg.Read(netID) if err != nil { log.Errorf("network %s is not operational", netID) return err } // Will Skip docker network deletion for ACI fabric mode. aci, _ := IsAciConfigured() if nwCfg.NwType != "infra" { // For Infra nw, endpoint delete initiated by netplugin // Check if there are any active endpoints if hasActiveEndpoints(nwCfg) { return core.Errorf("Error: Network has active endpoints") } if GetClusterMode() == core.Docker && aci == false { // Delete the docker network err = docknet.DeleteDockNet(nwCfg.Tenant, nwCfg.NetworkName, "") if err != nil { log.Errorf("Error deleting network %s. Err: %v", netID, err) // DeleteDockNet will fail when network has active endpoints. // No damage is done yet. It is safe to fail. return err } } } gstate.GlobalMutex.Lock() defer gstate.GlobalMutex.Unlock() gCfg := &gstate.Cfg{} gCfg.StateDriver = stateDriver err = gCfg.Read("") if err != nil { log.Errorf("error reading tenant info for %q. Error: %s", nwCfg.Tenant, err) return err } // Free resource associated with the network err = freeNetworkResources(stateDriver, nwCfg, gCfg) if err != nil { // Error while freeing up vlan/vxlan/subnet/gateway resources // This can only happen because of defects in code // No need of any corrective handling here return err } err = nwCfg.Clear() if err != nil { log.Errorf("error writing nw config. Error: %s", err) return err } return err }
go
func DeleteNetworkID(stateDriver core.StateDriver, netID string) error { nwCfg := &mastercfg.CfgNetworkState{} nwCfg.StateDriver = stateDriver err := nwCfg.Read(netID) if err != nil { log.Errorf("network %s is not operational", netID) return err } // Will Skip docker network deletion for ACI fabric mode. aci, _ := IsAciConfigured() if nwCfg.NwType != "infra" { // For Infra nw, endpoint delete initiated by netplugin // Check if there are any active endpoints if hasActiveEndpoints(nwCfg) { return core.Errorf("Error: Network has active endpoints") } if GetClusterMode() == core.Docker && aci == false { // Delete the docker network err = docknet.DeleteDockNet(nwCfg.Tenant, nwCfg.NetworkName, "") if err != nil { log.Errorf("Error deleting network %s. Err: %v", netID, err) // DeleteDockNet will fail when network has active endpoints. // No damage is done yet. It is safe to fail. return err } } } gstate.GlobalMutex.Lock() defer gstate.GlobalMutex.Unlock() gCfg := &gstate.Cfg{} gCfg.StateDriver = stateDriver err = gCfg.Read("") if err != nil { log.Errorf("error reading tenant info for %q. Error: %s", nwCfg.Tenant, err) return err } // Free resource associated with the network err = freeNetworkResources(stateDriver, nwCfg, gCfg) if err != nil { // Error while freeing up vlan/vxlan/subnet/gateway resources // This can only happen because of defects in code // No need of any corrective handling here return err } err = nwCfg.Clear() if err != nil { log.Errorf("error writing nw config. Error: %s", err) return err } return err }
[ "func", "DeleteNetworkID", "(", "stateDriver", "core", ".", "StateDriver", ",", "netID", "string", ")", "error", "{", "nwCfg", ":=", "&", "mastercfg", ".", "CfgNetworkState", "{", "}", "\n", "nwCfg", ".", "StateDriver", "=", "stateDriver", "\n", "err", ":=",...
// DeleteNetworkID removes a network by ID.
[ "DeleteNetworkID", "removes", "a", "network", "by", "ID", "." ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netmaster/master/network.go#L248-L305
7,850
contiv/netplugin
netmaster/master/network.go
DeleteNetworks
func DeleteNetworks(stateDriver core.StateDriver, tenant *intent.ConfigTenant) error { gCfg := &gstate.Cfg{} gCfg.StateDriver = stateDriver err := gCfg.Read("") if err != nil { log.Errorf("error reading tenant state. Error: %s", err) return err } err = validateNetworkConfig(tenant) if err != nil { log.Errorf("error validating network config. Error: %s", err) return err } for _, network := range tenant.Networks { networkID := network.Name + "." + tenant.Name err = DeleteNetworkID(stateDriver, networkID) if err != nil { return err } } return err }
go
func DeleteNetworks(stateDriver core.StateDriver, tenant *intent.ConfigTenant) error { gCfg := &gstate.Cfg{} gCfg.StateDriver = stateDriver err := gCfg.Read("") if err != nil { log.Errorf("error reading tenant state. Error: %s", err) return err } err = validateNetworkConfig(tenant) if err != nil { log.Errorf("error validating network config. Error: %s", err) return err } for _, network := range tenant.Networks { networkID := network.Name + "." + tenant.Name err = DeleteNetworkID(stateDriver, networkID) if err != nil { return err } } return err }
[ "func", "DeleteNetworks", "(", "stateDriver", "core", ".", "StateDriver", ",", "tenant", "*", "intent", ".", "ConfigTenant", ")", "error", "{", "gCfg", ":=", "&", "gstate", ".", "Cfg", "{", "}", "\n", "gCfg", ".", "StateDriver", "=", "stateDriver", "\n\n",...
// DeleteNetworks removes all the virtual networks for a given tenant.
[ "DeleteNetworks", "removes", "all", "the", "virtual", "networks", "for", "a", "given", "tenant", "." ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netmaster/master/network.go#L308-L333
7,851
contiv/netplugin
netmaster/master/network.go
networkReleaseAddress
func networkReleaseAddress(nwCfg *mastercfg.CfgNetworkState, epgCfg *mastercfg.EndpointGroupState, ipAddress string) error { isIPv6 := netutils.IsIPv6(ipAddress) if isIPv6 { hostID, err := netutils.GetIPv6HostID(nwCfg.SubnetIP, nwCfg.SubnetLen, ipAddress) if err != nil { log.Errorf("error getting host id from hostIP %s Subnet %s/%d. Error: %s", ipAddress, nwCfg.SubnetIP, nwCfg.SubnetLen, err) return err } // networkReleaseAddress is called from multiple places // Make sure we decrement the EpCount only if the IPAddress // was not already freed earlier if _, found := nwCfg.IPv6AllocMap[hostID]; found { nwCfg.EpAddrCount-- } delete(nwCfg.IPv6AllocMap, hostID) } else { if epgCfg != nil && len(epgCfg.IPPool) > 0 { log.Infof("releasing epg ip: %s", ipAddress) ipAddrValue, err := netutils.GetIPNumber(nwCfg.SubnetIP, nwCfg.SubnetLen, 32, ipAddress) if err != nil { log.Errorf("error getting host id from hostIP %s pool %s. Error: %s", ipAddress, epgCfg.IPPool, err) return err } // networkReleaseAddress is called from multiple places // Make sure we decrement the EpCount only if the IPAddress // was not already freed earlier if epgCfg.EPGIPAllocMap.Test(ipAddrValue) { nwCfg.EpAddrCount-- } epgCfg.EPGIPAllocMap.Clear(ipAddrValue) if err := epgCfg.Write(); err != nil { log.Errorf("error writing epg config. Error: %s", err) return err } } else { ipAddrValue, err := netutils.GetIPNumber(nwCfg.SubnetIP, nwCfg.SubnetLen, 32, ipAddress) if err != nil { log.Errorf("error getting host id from hostIP %s Subnet %s/%d. Error: %s", ipAddress, nwCfg.SubnetIP, nwCfg.SubnetLen, err) return err } // networkReleaseAddress is called from multiple places // Make sure we decrement the EpCount only if the IPAddress // was not already freed earlier if nwCfg.IPAllocMap.Test(ipAddrValue) { nwCfg.EpAddrCount-- } nwCfg.IPAllocMap.Clear(ipAddrValue) log.Infof("Releasing IP Address: %v"+ "from networkId:%+v", ipAddrValue, nwCfg.NetworkName) } } err := nwCfg.Write() if err != nil { log.Errorf("error writing nw config. Error: %s", err) return err } return nil }
go
func networkReleaseAddress(nwCfg *mastercfg.CfgNetworkState, epgCfg *mastercfg.EndpointGroupState, ipAddress string) error { isIPv6 := netutils.IsIPv6(ipAddress) if isIPv6 { hostID, err := netutils.GetIPv6HostID(nwCfg.SubnetIP, nwCfg.SubnetLen, ipAddress) if err != nil { log.Errorf("error getting host id from hostIP %s Subnet %s/%d. Error: %s", ipAddress, nwCfg.SubnetIP, nwCfg.SubnetLen, err) return err } // networkReleaseAddress is called from multiple places // Make sure we decrement the EpCount only if the IPAddress // was not already freed earlier if _, found := nwCfg.IPv6AllocMap[hostID]; found { nwCfg.EpAddrCount-- } delete(nwCfg.IPv6AllocMap, hostID) } else { if epgCfg != nil && len(epgCfg.IPPool) > 0 { log.Infof("releasing epg ip: %s", ipAddress) ipAddrValue, err := netutils.GetIPNumber(nwCfg.SubnetIP, nwCfg.SubnetLen, 32, ipAddress) if err != nil { log.Errorf("error getting host id from hostIP %s pool %s. Error: %s", ipAddress, epgCfg.IPPool, err) return err } // networkReleaseAddress is called from multiple places // Make sure we decrement the EpCount only if the IPAddress // was not already freed earlier if epgCfg.EPGIPAllocMap.Test(ipAddrValue) { nwCfg.EpAddrCount-- } epgCfg.EPGIPAllocMap.Clear(ipAddrValue) if err := epgCfg.Write(); err != nil { log.Errorf("error writing epg config. Error: %s", err) return err } } else { ipAddrValue, err := netutils.GetIPNumber(nwCfg.SubnetIP, nwCfg.SubnetLen, 32, ipAddress) if err != nil { log.Errorf("error getting host id from hostIP %s Subnet %s/%d. Error: %s", ipAddress, nwCfg.SubnetIP, nwCfg.SubnetLen, err) return err } // networkReleaseAddress is called from multiple places // Make sure we decrement the EpCount only if the IPAddress // was not already freed earlier if nwCfg.IPAllocMap.Test(ipAddrValue) { nwCfg.EpAddrCount-- } nwCfg.IPAllocMap.Clear(ipAddrValue) log.Infof("Releasing IP Address: %v"+ "from networkId:%+v", ipAddrValue, nwCfg.NetworkName) } } err := nwCfg.Write() if err != nil { log.Errorf("error writing nw config. Error: %s", err) return err } return nil }
[ "func", "networkReleaseAddress", "(", "nwCfg", "*", "mastercfg", ".", "CfgNetworkState", ",", "epgCfg", "*", "mastercfg", ".", "EndpointGroupState", ",", "ipAddress", "string", ")", "error", "{", "isIPv6", ":=", "netutils", ".", "IsIPv6", "(", "ipAddress", ")", ...
// networkReleaseAddress release the ip address
[ "networkReleaseAddress", "release", "the", "ip", "address" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netmaster/master/network.go#L464-L527
7,852
contiv/netplugin
netplugin/cluster/cluster.go
addMaster
func addMaster(netplugin *plugin.NetPlugin, srvInfo objdb.ServiceInfo) error { // save it in db MasterDB[masterKey(srvInfo)] = &srvInfo // tell the plugin about the master return netplugin.AddMaster(core.ServiceInfo{ HostAddr: srvInfo.HostAddr, Port: netmasterRPCPort, }) }
go
func addMaster(netplugin *plugin.NetPlugin, srvInfo objdb.ServiceInfo) error { // save it in db MasterDB[masterKey(srvInfo)] = &srvInfo // tell the plugin about the master return netplugin.AddMaster(core.ServiceInfo{ HostAddr: srvInfo.HostAddr, Port: netmasterRPCPort, }) }
[ "func", "addMaster", "(", "netplugin", "*", "plugin", ".", "NetPlugin", ",", "srvInfo", "objdb", ".", "ServiceInfo", ")", "error", "{", "// save it in db", "MasterDB", "[", "masterKey", "(", "srvInfo", ")", "]", "=", "&", "srvInfo", "\n", "// tell the plugin a...
// Add a master node
[ "Add", "a", "master", "node" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netplugin/cluster/cluster.go#L52-L60
7,853
contiv/netplugin
netplugin/cluster/cluster.go
deleteMaster
func deleteMaster(netplugin *plugin.NetPlugin, srvInfo objdb.ServiceInfo) error { // delete from the db delete(MasterDB, masterKey(srvInfo)) // tel plugin about it return netplugin.DeleteMaster(core.ServiceInfo{ HostAddr: srvInfo.HostAddr, Port: netmasterRPCPort, }) }
go
func deleteMaster(netplugin *plugin.NetPlugin, srvInfo objdb.ServiceInfo) error { // delete from the db delete(MasterDB, masterKey(srvInfo)) // tel plugin about it return netplugin.DeleteMaster(core.ServiceInfo{ HostAddr: srvInfo.HostAddr, Port: netmasterRPCPort, }) }
[ "func", "deleteMaster", "(", "netplugin", "*", "plugin", ".", "NetPlugin", ",", "srvInfo", "objdb", ".", "ServiceInfo", ")", "error", "{", "// delete from the db", "delete", "(", "MasterDB", ",", "masterKey", "(", "srvInfo", ")", ")", "\n\n", "// tel plugin abou...
// delete master node
[ "delete", "master", "node" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netplugin/cluster/cluster.go#L63-L72
7,854
contiv/netplugin
netplugin/cluster/cluster.go
getMasterLockHolder
func getMasterLockHolder() (string, error) { // Create the lock leaderLock, err := ObjdbClient.NewLock("netmaster/leader", "", 0) if err != nil { log.Fatalf("Could not create leader lock. Err: %v", err) } // get current holder of leader lock masterNode := leaderLock.GetHolder() if masterNode == "" { log.Errorf("No leader node found") return "", errors.New("no leader node") } return masterNode, nil }
go
func getMasterLockHolder() (string, error) { // Create the lock leaderLock, err := ObjdbClient.NewLock("netmaster/leader", "", 0) if err != nil { log.Fatalf("Could not create leader lock. Err: %v", err) } // get current holder of leader lock masterNode := leaderLock.GetHolder() if masterNode == "" { log.Errorf("No leader node found") return "", errors.New("no leader node") } return masterNode, nil }
[ "func", "getMasterLockHolder", "(", ")", "(", "string", ",", "error", ")", "{", "// Create the lock", "leaderLock", ",", "err", ":=", "ObjdbClient", ".", "NewLock", "(", "\"", "\"", ",", "\"", "\"", ",", "0", ")", "\n", "if", "err", "!=", "nil", "{", ...
// getMasterLockHolder returns the IP of current master lock hoder
[ "getMasterLockHolder", "returns", "the", "IP", "of", "current", "master", "lock", "hoder" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netplugin/cluster/cluster.go#L75-L90
7,855
contiv/netplugin
netplugin/cluster/cluster.go
MasterPostReq
func MasterPostReq(path string, req interface{}, resp interface{}) error { return masterReq(path, req, resp, false) }
go
func MasterPostReq(path string, req interface{}, resp interface{}) error { return masterReq(path, req, resp, false) }
[ "func", "MasterPostReq", "(", "path", "string", ",", "req", "interface", "{", "}", ",", "resp", "interface", "{", "}", ")", "error", "{", "return", "masterReq", "(", "path", ",", "req", ",", "resp", ",", "false", ")", "\n", "}" ]
// MasterPostReq makes a POST request to master node
[ "MasterPostReq", "makes", "a", "POST", "request", "to", "master", "node" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netplugin/cluster/cluster.go#L161-L163
7,856
contiv/netplugin
netplugin/cluster/cluster.go
registerService
func registerService(objClient objdb.API, ctrlIP, vtepIP, hostname string, vxlanUDPPort int) error { // netplugin service info srvInfo := objdb.ServiceInfo{ ServiceName: "netplugin", TTL: 10, HostAddr: ctrlIP, Port: netpluginRPCPort1, Hostname: hostname, } // Register the node with service registry err := objClient.RegisterService(srvInfo) if err != nil { log.Fatalf("Error registering service. Err: %v", err) return err } srvInfo = objdb.ServiceInfo{ ServiceName: "netplugin", TTL: 10, HostAddr: ctrlIP, Port: netpluginRPCPort2, Hostname: hostname, } // Register the node with service registry err = objClient.RegisterService(srvInfo) if err != nil { log.Fatalf("Error registering service. Err: %v", err) return err } // netplugn VTEP service info srvInfo = objdb.ServiceInfo{ ServiceName: "netplugin.vtep", TTL: 10, HostAddr: vtepIP, Port: vxlanUDPPort, Hostname: hostname, } // Register the node with service registry err = objClient.RegisterService(srvInfo) if err != nil { log.Fatalf("Error registering service. Err: %v", err) return err } log.Infof("Registered netplugin service with registry") return nil }
go
func registerService(objClient objdb.API, ctrlIP, vtepIP, hostname string, vxlanUDPPort int) error { // netplugin service info srvInfo := objdb.ServiceInfo{ ServiceName: "netplugin", TTL: 10, HostAddr: ctrlIP, Port: netpluginRPCPort1, Hostname: hostname, } // Register the node with service registry err := objClient.RegisterService(srvInfo) if err != nil { log.Fatalf("Error registering service. Err: %v", err) return err } srvInfo = objdb.ServiceInfo{ ServiceName: "netplugin", TTL: 10, HostAddr: ctrlIP, Port: netpluginRPCPort2, Hostname: hostname, } // Register the node with service registry err = objClient.RegisterService(srvInfo) if err != nil { log.Fatalf("Error registering service. Err: %v", err) return err } // netplugn VTEP service info srvInfo = objdb.ServiceInfo{ ServiceName: "netplugin.vtep", TTL: 10, HostAddr: vtepIP, Port: vxlanUDPPort, Hostname: hostname, } // Register the node with service registry err = objClient.RegisterService(srvInfo) if err != nil { log.Fatalf("Error registering service. Err: %v", err) return err } log.Infof("Registered netplugin service with registry") return nil }
[ "func", "registerService", "(", "objClient", "objdb", ".", "API", ",", "ctrlIP", ",", "vtepIP", ",", "hostname", "string", ",", "vxlanUDPPort", "int", ")", "error", "{", "// netplugin service info", "srvInfo", ":=", "objdb", ".", "ServiceInfo", "{", "ServiceName...
// Register netplugin with service registry
[ "Register", "netplugin", "with", "service", "registry" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netplugin/cluster/cluster.go#L171-L221
7,857
contiv/netplugin
netplugin/cluster/cluster.go
peerDiscoveryLoop
func peerDiscoveryLoop(netplugin *plugin.NetPlugin, objClient objdb.API, ctrlIP, vtepIP string) { // Create channels for watch thread nodeEventCh := make(chan objdb.WatchServiceEvent, 1) watchStopCh := make(chan bool, 1) masterEventCh := make(chan objdb.WatchServiceEvent, 1) masterWatchStopCh := make(chan bool, 1) // Start a watch on netmaster err := objClient.WatchService("netmaster.rpc", masterEventCh, masterWatchStopCh) if err != nil { log.Fatalf("Could not start a watch on netmaster service. Err: %v", err) } // Start a watch on netplugin service err = objClient.WatchService("netplugin.vtep", nodeEventCh, watchStopCh) if err != nil { log.Fatalf("Could not start a watch on netplugin service. Err: %v", err) } for { select { case srvEvent := <-nodeEventCh: log.Debugf("Received netplugin service watch event: %+v", srvEvent) // collect the info about the node nodeInfo := srvEvent.ServiceInfo // check if its our own info coming back to us if nodeInfo.HostAddr == vtepIP { break } // Handle based on event type if srvEvent.EventType == objdb.WatchServiceEventAdd { log.Infof("Node add event for {%+v}", nodeInfo) // add the node err := netplugin.AddPeerHost(core.ServiceInfo{ HostAddr: nodeInfo.HostAddr, Port: netplugin.PluginConfig.Instance.VxlanUDPPort, }) if err != nil { log.Errorf("Error adding node {%+v}. Err: %v", nodeInfo, err) } } else if srvEvent.EventType == objdb.WatchServiceEventDel { log.Infof("Node delete event for {%+v}", nodeInfo) // remove the node err := netplugin.DeletePeerHost(core.ServiceInfo{ HostAddr: nodeInfo.HostAddr, Port: netplugin.PluginConfig.Instance.VxlanUDPPort, }) if err != nil { log.Errorf("Error deleting node {%+v}. Err: %v", nodeInfo, err) } } case srvEvent := <-masterEventCh: log.Infof("Received netmaster service watch event: %+v", srvEvent) // collect the info about the node nodeInfo := srvEvent.ServiceInfo // Handle based on event type if srvEvent.EventType == objdb.WatchServiceEventAdd { log.Infof("Master add event for {%+v}", nodeInfo) // Add the master err := addMaster(netplugin, nodeInfo) if err != nil { log.Errorf("Error adding master {%+v}. Err: %v", nodeInfo, err) } } else if srvEvent.EventType == objdb.WatchServiceEventDel { log.Infof("Master delete event for {%+v}", nodeInfo) // Delete the master err := deleteMaster(netplugin, nodeInfo) if err != nil { log.Errorf("Error deleting master {%+v}. Err: %v", nodeInfo, err) } } } // Dont process next peer event for another 100ms time.Sleep(100 * time.Millisecond) } }
go
func peerDiscoveryLoop(netplugin *plugin.NetPlugin, objClient objdb.API, ctrlIP, vtepIP string) { // Create channels for watch thread nodeEventCh := make(chan objdb.WatchServiceEvent, 1) watchStopCh := make(chan bool, 1) masterEventCh := make(chan objdb.WatchServiceEvent, 1) masterWatchStopCh := make(chan bool, 1) // Start a watch on netmaster err := objClient.WatchService("netmaster.rpc", masterEventCh, masterWatchStopCh) if err != nil { log.Fatalf("Could not start a watch on netmaster service. Err: %v", err) } // Start a watch on netplugin service err = objClient.WatchService("netplugin.vtep", nodeEventCh, watchStopCh) if err != nil { log.Fatalf("Could not start a watch on netplugin service. Err: %v", err) } for { select { case srvEvent := <-nodeEventCh: log.Debugf("Received netplugin service watch event: %+v", srvEvent) // collect the info about the node nodeInfo := srvEvent.ServiceInfo // check if its our own info coming back to us if nodeInfo.HostAddr == vtepIP { break } // Handle based on event type if srvEvent.EventType == objdb.WatchServiceEventAdd { log.Infof("Node add event for {%+v}", nodeInfo) // add the node err := netplugin.AddPeerHost(core.ServiceInfo{ HostAddr: nodeInfo.HostAddr, Port: netplugin.PluginConfig.Instance.VxlanUDPPort, }) if err != nil { log.Errorf("Error adding node {%+v}. Err: %v", nodeInfo, err) } } else if srvEvent.EventType == objdb.WatchServiceEventDel { log.Infof("Node delete event for {%+v}", nodeInfo) // remove the node err := netplugin.DeletePeerHost(core.ServiceInfo{ HostAddr: nodeInfo.HostAddr, Port: netplugin.PluginConfig.Instance.VxlanUDPPort, }) if err != nil { log.Errorf("Error deleting node {%+v}. Err: %v", nodeInfo, err) } } case srvEvent := <-masterEventCh: log.Infof("Received netmaster service watch event: %+v", srvEvent) // collect the info about the node nodeInfo := srvEvent.ServiceInfo // Handle based on event type if srvEvent.EventType == objdb.WatchServiceEventAdd { log.Infof("Master add event for {%+v}", nodeInfo) // Add the master err := addMaster(netplugin, nodeInfo) if err != nil { log.Errorf("Error adding master {%+v}. Err: %v", nodeInfo, err) } } else if srvEvent.EventType == objdb.WatchServiceEventDel { log.Infof("Master delete event for {%+v}", nodeInfo) // Delete the master err := deleteMaster(netplugin, nodeInfo) if err != nil { log.Errorf("Error deleting master {%+v}. Err: %v", nodeInfo, err) } } } // Dont process next peer event for another 100ms time.Sleep(100 * time.Millisecond) } }
[ "func", "peerDiscoveryLoop", "(", "netplugin", "*", "plugin", ".", "NetPlugin", ",", "objClient", "objdb", ".", "API", ",", "ctrlIP", ",", "vtepIP", "string", ")", "{", "// Create channels for watch thread", "nodeEventCh", ":=", "make", "(", "chan", "objdb", "."...
// Main loop to discover peer hosts and masters
[ "Main", "loop", "to", "discover", "peer", "hosts", "and", "masters" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netplugin/cluster/cluster.go#L224-L309
7,858
contiv/netplugin
netplugin/cluster/cluster.go
Init
func Init(storeDriver string, storeURLs []string) error { var err error // Create an objdb client ObjdbClient, err = objdb.InitClient(storeDriver, storeURLs) return err }
go
func Init(storeDriver string, storeURLs []string) error { var err error // Create an objdb client ObjdbClient, err = objdb.InitClient(storeDriver, storeURLs) return err }
[ "func", "Init", "(", "storeDriver", "string", ",", "storeURLs", "[", "]", "string", ")", "error", "{", "var", "err", "error", "\n\n", "// Create an objdb client", "ObjdbClient", ",", "err", "=", "objdb", ".", "InitClient", "(", "storeDriver", ",", "storeURLs",...
// Init initializes the cluster module
[ "Init", "initializes", "the", "cluster", "module" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netplugin/cluster/cluster.go#L312-L319
7,859
contiv/netplugin
netplugin/cluster/cluster.go
RunLoop
func RunLoop(netplugin *plugin.NetPlugin, ctrlIP, vtepIP, hostname string) error { // Register ourselves err := registerService(ObjdbClient, ctrlIP, vtepIP, hostname, netplugin.PluginConfig.Instance.VxlanUDPPort) // Start peer discovery loop go peerDiscoveryLoop(netplugin, ObjdbClient, ctrlIP, vtepIP) return err }
go
func RunLoop(netplugin *plugin.NetPlugin, ctrlIP, vtepIP, hostname string) error { // Register ourselves err := registerService(ObjdbClient, ctrlIP, vtepIP, hostname, netplugin.PluginConfig.Instance.VxlanUDPPort) // Start peer discovery loop go peerDiscoveryLoop(netplugin, ObjdbClient, ctrlIP, vtepIP) return err }
[ "func", "RunLoop", "(", "netplugin", "*", "plugin", ".", "NetPlugin", ",", "ctrlIP", ",", "vtepIP", ",", "hostname", "string", ")", "error", "{", "// Register ourselves", "err", ":=", "registerService", "(", "ObjdbClient", ",", "ctrlIP", ",", "vtepIP", ",", ...
// RunLoop registers netplugin service with cluster store and runs peer discovery
[ "RunLoop", "registers", "netplugin", "service", "with", "cluster", "store", "and", "runs", "peer", "discovery" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/netplugin/cluster/cluster.go#L322-L330
7,860
contiv/netplugin
contivmodel/contivModel.go
makeHttpHandler
func makeHttpHandler(handlerFunc HttpApiFunc) http.HandlerFunc { // Create a closure and return an anonymous function return func(w http.ResponseWriter, r *http.Request) { // Call the handler resp, err := handlerFunc(w, r, mux.Vars(r)) if err != nil { // Log error log.Errorf("Handler for %s %s returned error: %s", r.Method, r.URL, err) // Send HTTP response http.Error(w, err.Error(), http.StatusInternalServerError) } else { // Send HTTP response as Json err = writeJSON(w, http.StatusOK, resp) if err != nil { log.Errorf("Error generating json. Err: %v", err) } } } }
go
func makeHttpHandler(handlerFunc HttpApiFunc) http.HandlerFunc { // Create a closure and return an anonymous function return func(w http.ResponseWriter, r *http.Request) { // Call the handler resp, err := handlerFunc(w, r, mux.Vars(r)) if err != nil { // Log error log.Errorf("Handler for %s %s returned error: %s", r.Method, r.URL, err) // Send HTTP response http.Error(w, err.Error(), http.StatusInternalServerError) } else { // Send HTTP response as Json err = writeJSON(w, http.StatusOK, resp) if err != nil { log.Errorf("Error generating json. Err: %v", err) } } } }
[ "func", "makeHttpHandler", "(", "handlerFunc", "HttpApiFunc", ")", "http", ".", "HandlerFunc", "{", "// Create a closure and return an anonymous function", "return", "func", "(", "w", "http", ".", "ResponseWriter", ",", "r", "*", "http", ".", "Request", ")", "{", ...
// Simple Wrapper for http handlers
[ "Simple", "Wrapper", "for", "http", "handlers" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L848-L867
7,861
contiv/netplugin
contivmodel/contivModel.go
GetOperAciGw
func GetOperAciGw(obj *AciGwInspect) error { // Check if we handle this object if objCallbackHandler.AciGwCb == nil { log.Errorf("No callback registered for aciGw object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.AciGwCb.AciGwGetOper(obj) if err != nil { log.Errorf("AciGwDelete retruned error for: %+v. Err: %v", obj, err) return err } return nil }
go
func GetOperAciGw(obj *AciGwInspect) error { // Check if we handle this object if objCallbackHandler.AciGwCb == nil { log.Errorf("No callback registered for aciGw object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.AciGwCb.AciGwGetOper(obj) if err != nil { log.Errorf("AciGwDelete retruned error for: %+v. Err: %v", obj, err) return err } return nil }
[ "func", "GetOperAciGw", "(", "obj", "*", "AciGwInspect", ")", "error", "{", "// Check if we handle this object", "if", "objCallbackHandler", ".", "AciGwCb", "==", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ")", "\n", "return", "errors", ".", "New", "...
// Get a aciGwOper object
[ "Get", "a", "aciGwOper", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L1099-L1114
7,862
contiv/netplugin
contivmodel/contivModel.go
CreateAciGw
func CreateAciGw(obj *AciGw) error { // Validate parameters err := ValidateAciGw(obj) if err != nil { log.Errorf("ValidateAciGw retruned error for: %+v. Err: %v", obj, err) return err } // Check if we handle this object if objCallbackHandler.AciGwCb == nil { log.Errorf("No callback registered for aciGw object") return errors.New("Invalid object type") } saveObj := obj collections.aciGwMutex.Lock() key := collections.aciGws[obj.Key] collections.aciGwMutex.Unlock() // Check if object already exists if key != nil { // Perform Update callback err = objCallbackHandler.AciGwCb.AciGwUpdate(collections.aciGws[obj.Key], obj) if err != nil { log.Errorf("AciGwUpdate retruned error for: %+v. Err: %v", obj, err) return err } // save the original object after update collections.aciGwMutex.Lock() saveObj = collections.aciGws[obj.Key] collections.aciGwMutex.Unlock() } else { // save it in cache collections.aciGwMutex.Lock() collections.aciGws[obj.Key] = obj collections.aciGwMutex.Unlock() // Perform Create callback err = objCallbackHandler.AciGwCb.AciGwCreate(obj) if err != nil { log.Errorf("AciGwCreate retruned error for: %+v. Err: %v", obj, err) collections.aciGwMutex.Lock() delete(collections.aciGws, obj.Key) collections.aciGwMutex.Unlock() return err } } // Write it to modeldb collections.aciGwMutex.Lock() err = saveObj.Write() collections.aciGwMutex.Unlock() if err != nil { log.Errorf("Error saving aciGw %s to db. Err: %v", saveObj.Key, err) return err } return nil }
go
func CreateAciGw(obj *AciGw) error { // Validate parameters err := ValidateAciGw(obj) if err != nil { log.Errorf("ValidateAciGw retruned error for: %+v. Err: %v", obj, err) return err } // Check if we handle this object if objCallbackHandler.AciGwCb == nil { log.Errorf("No callback registered for aciGw object") return errors.New("Invalid object type") } saveObj := obj collections.aciGwMutex.Lock() key := collections.aciGws[obj.Key] collections.aciGwMutex.Unlock() // Check if object already exists if key != nil { // Perform Update callback err = objCallbackHandler.AciGwCb.AciGwUpdate(collections.aciGws[obj.Key], obj) if err != nil { log.Errorf("AciGwUpdate retruned error for: %+v. Err: %v", obj, err) return err } // save the original object after update collections.aciGwMutex.Lock() saveObj = collections.aciGws[obj.Key] collections.aciGwMutex.Unlock() } else { // save it in cache collections.aciGwMutex.Lock() collections.aciGws[obj.Key] = obj collections.aciGwMutex.Unlock() // Perform Create callback err = objCallbackHandler.AciGwCb.AciGwCreate(obj) if err != nil { log.Errorf("AciGwCreate retruned error for: %+v. Err: %v", obj, err) collections.aciGwMutex.Lock() delete(collections.aciGws, obj.Key) collections.aciGwMutex.Unlock() return err } } // Write it to modeldb collections.aciGwMutex.Lock() err = saveObj.Write() collections.aciGwMutex.Unlock() if err != nil { log.Errorf("Error saving aciGw %s to db. Err: %v", saveObj.Key, err) return err } return nil }
[ "func", "CreateAciGw", "(", "obj", "*", "AciGw", ")", "error", "{", "// Validate parameters", "err", ":=", "ValidateAciGw", "(", "obj", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "obj", ",", "err", ")", "\n"...
// Create a aciGw object
[ "Create", "a", "aciGw", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L1195-L1255
7,863
contiv/netplugin
contivmodel/contivModel.go
FindAciGw
func FindAciGw(key string) *AciGw { collections.aciGwMutex.Lock() defer collections.aciGwMutex.Unlock() obj := collections.aciGws[key] if obj == nil { return nil } return obj }
go
func FindAciGw(key string) *AciGw { collections.aciGwMutex.Lock() defer collections.aciGwMutex.Unlock() obj := collections.aciGws[key] if obj == nil { return nil } return obj }
[ "func", "FindAciGw", "(", "key", "string", ")", "*", "AciGw", "{", "collections", ".", "aciGwMutex", ".", "Lock", "(", ")", "\n", "defer", "collections", ".", "aciGwMutex", ".", "Unlock", "(", ")", "\n\n", "obj", ":=", "collections", ".", "aciGws", "[", ...
// Return a pointer to aciGw from collection
[ "Return", "a", "pointer", "to", "aciGw", "from", "collection" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L1258-L1268
7,864
contiv/netplugin
contivmodel/contivModel.go
DeleteAciGw
func DeleteAciGw(key string) error { collections.aciGwMutex.Lock() obj := collections.aciGws[key] collections.aciGwMutex.Unlock() if obj == nil { log.Errorf("aciGw %s not found", key) return errors.New("aciGw not found") } // Check if we handle this object if objCallbackHandler.AciGwCb == nil { log.Errorf("No callback registered for aciGw object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.AciGwCb.AciGwDelete(obj) if err != nil { log.Errorf("AciGwDelete retruned error for: %+v. Err: %v", obj, err) return err } // delete it from modeldb collections.aciGwMutex.Lock() err = obj.Delete() collections.aciGwMutex.Unlock() if err != nil { log.Errorf("Error deleting aciGw %s. Err: %v", obj.Key, err) } // delete it from cache collections.aciGwMutex.Lock() delete(collections.aciGws, key) collections.aciGwMutex.Unlock() return nil }
go
func DeleteAciGw(key string) error { collections.aciGwMutex.Lock() obj := collections.aciGws[key] collections.aciGwMutex.Unlock() if obj == nil { log.Errorf("aciGw %s not found", key) return errors.New("aciGw not found") } // Check if we handle this object if objCallbackHandler.AciGwCb == nil { log.Errorf("No callback registered for aciGw object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.AciGwCb.AciGwDelete(obj) if err != nil { log.Errorf("AciGwDelete retruned error for: %+v. Err: %v", obj, err) return err } // delete it from modeldb collections.aciGwMutex.Lock() err = obj.Delete() collections.aciGwMutex.Unlock() if err != nil { log.Errorf("Error deleting aciGw %s. Err: %v", obj.Key, err) } // delete it from cache collections.aciGwMutex.Lock() delete(collections.aciGws, key) collections.aciGwMutex.Unlock() return nil }
[ "func", "DeleteAciGw", "(", "key", "string", ")", "error", "{", "collections", ".", "aciGwMutex", ".", "Lock", "(", ")", "\n", "obj", ":=", "collections", ".", "aciGws", "[", "key", "]", "\n", "collections", ".", "aciGwMutex", ".", "Unlock", "(", ")", ...
// Delete a aciGw object
[ "Delete", "a", "aciGw", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L1271-L1307
7,865
contiv/netplugin
contivmodel/contivModel.go
ValidateAciGw
func ValidateAciGw(obj *AciGw) error { collections.aciGwMutex.Lock() defer collections.aciGwMutex.Unlock() // Validate key is correct keyStr := obj.Name if obj.Key != keyStr { log.Errorf("Expecting AciGw Key: %s. Got: %s", keyStr, obj.Key) return errors.New("Invalid Key") } // Validate each field if len(obj.EnforcePolicies) > 64 { return errors.New("enforcePolicies string too long") } enforcePoliciesMatch := regexp.MustCompile("^(yes|no){1}$") if enforcePoliciesMatch.MatchString(obj.EnforcePolicies) == false { return errors.New("enforcePolicies string invalid format") } if len(obj.IncludeCommonTenant) > 64 { return errors.New("includeCommonTenant string too long") } includeCommonTenantMatch := regexp.MustCompile("^(yes|no){1}$") if includeCommonTenantMatch.MatchString(obj.IncludeCommonTenant) == false { return errors.New("includeCommonTenant string invalid format") } if len(obj.Name) > 64 { return errors.New("name string too long") } nameMatch := regexp.MustCompile("^(aciGw)$") if nameMatch.MatchString(obj.Name) == false { return errors.New("name string invalid format") } if len(obj.NodeBindings) > 2048 { return errors.New("nodeBindings string too long") } nodeBindingsMatch := regexp.MustCompile("^$|^(topology/pod-[0-9]{1,4}/node-[0-9]{1,4}){1}(,topology/pod-[0-9]{1,4}/node-[0-9]{1,4})*$") if nodeBindingsMatch.MatchString(obj.NodeBindings) == false { return errors.New("nodeBindings string invalid format") } if len(obj.PathBindings) > 2048 { return errors.New("pathBindings string too long") } pathBindingsMatch := regexp.MustCompile("^$|^(topology/pod-[0-9]{1,4}/paths-[0-9]{1,4}/pathep-\\[eth[0-9]{1,2}/[0-9]{1,2}\\]){1}(,topology/pod-[0-9]{1,4}/paths-[0-9]{1,4}/pathep-\\[eth[0-9]{1,2}/[0-9]{1,2}\\])*$") if pathBindingsMatch.MatchString(obj.PathBindings) == false { return errors.New("pathBindings string invalid format") } if len(obj.PhysicalDomain) > 128 { return errors.New("physicalDomain string too long") } physicalDomainMatch := regexp.MustCompile("^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$") if physicalDomainMatch.MatchString(obj.PhysicalDomain) == false { return errors.New("physicalDomain string invalid format") } return nil }
go
func ValidateAciGw(obj *AciGw) error { collections.aciGwMutex.Lock() defer collections.aciGwMutex.Unlock() // Validate key is correct keyStr := obj.Name if obj.Key != keyStr { log.Errorf("Expecting AciGw Key: %s. Got: %s", keyStr, obj.Key) return errors.New("Invalid Key") } // Validate each field if len(obj.EnforcePolicies) > 64 { return errors.New("enforcePolicies string too long") } enforcePoliciesMatch := regexp.MustCompile("^(yes|no){1}$") if enforcePoliciesMatch.MatchString(obj.EnforcePolicies) == false { return errors.New("enforcePolicies string invalid format") } if len(obj.IncludeCommonTenant) > 64 { return errors.New("includeCommonTenant string too long") } includeCommonTenantMatch := regexp.MustCompile("^(yes|no){1}$") if includeCommonTenantMatch.MatchString(obj.IncludeCommonTenant) == false { return errors.New("includeCommonTenant string invalid format") } if len(obj.Name) > 64 { return errors.New("name string too long") } nameMatch := regexp.MustCompile("^(aciGw)$") if nameMatch.MatchString(obj.Name) == false { return errors.New("name string invalid format") } if len(obj.NodeBindings) > 2048 { return errors.New("nodeBindings string too long") } nodeBindingsMatch := regexp.MustCompile("^$|^(topology/pod-[0-9]{1,4}/node-[0-9]{1,4}){1}(,topology/pod-[0-9]{1,4}/node-[0-9]{1,4})*$") if nodeBindingsMatch.MatchString(obj.NodeBindings) == false { return errors.New("nodeBindings string invalid format") } if len(obj.PathBindings) > 2048 { return errors.New("pathBindings string too long") } pathBindingsMatch := regexp.MustCompile("^$|^(topology/pod-[0-9]{1,4}/paths-[0-9]{1,4}/pathep-\\[eth[0-9]{1,2}/[0-9]{1,2}\\]){1}(,topology/pod-[0-9]{1,4}/paths-[0-9]{1,4}/pathep-\\[eth[0-9]{1,2}/[0-9]{1,2}\\])*$") if pathBindingsMatch.MatchString(obj.PathBindings) == false { return errors.New("pathBindings string invalid format") } if len(obj.PhysicalDomain) > 128 { return errors.New("physicalDomain string too long") } physicalDomainMatch := regexp.MustCompile("^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$") if physicalDomainMatch.MatchString(obj.PhysicalDomain) == false { return errors.New("physicalDomain string invalid format") } return nil }
[ "func", "ValidateAciGw", "(", "obj", "*", "AciGw", ")", "error", "{", "collections", ".", "aciGwMutex", ".", "Lock", "(", ")", "\n", "defer", "collections", ".", "aciGwMutex", ".", "Unlock", "(", ")", "\n\n", "// Validate key is correct", "keyStr", ":=", "ob...
// Validate a aciGw object
[ "Validate", "a", "aciGw", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L1370-L1438
7,866
contiv/netplugin
contivmodel/contivModel.go
CreateAppProfile
func CreateAppProfile(obj *AppProfile) error { // Validate parameters err := ValidateAppProfile(obj) if err != nil { log.Errorf("ValidateAppProfile retruned error for: %+v. Err: %v", obj, err) return err } // Check if we handle this object if objCallbackHandler.AppProfileCb == nil { log.Errorf("No callback registered for appProfile object") return errors.New("Invalid object type") } saveObj := obj collections.appProfileMutex.Lock() key := collections.appProfiles[obj.Key] collections.appProfileMutex.Unlock() // Check if object already exists if key != nil { // Perform Update callback err = objCallbackHandler.AppProfileCb.AppProfileUpdate(collections.appProfiles[obj.Key], obj) if err != nil { log.Errorf("AppProfileUpdate retruned error for: %+v. Err: %v", obj, err) return err } // save the original object after update collections.appProfileMutex.Lock() saveObj = collections.appProfiles[obj.Key] collections.appProfileMutex.Unlock() } else { // save it in cache collections.appProfileMutex.Lock() collections.appProfiles[obj.Key] = obj collections.appProfileMutex.Unlock() // Perform Create callback err = objCallbackHandler.AppProfileCb.AppProfileCreate(obj) if err != nil { log.Errorf("AppProfileCreate retruned error for: %+v. Err: %v", obj, err) collections.appProfileMutex.Lock() delete(collections.appProfiles, obj.Key) collections.appProfileMutex.Unlock() return err } } // Write it to modeldb collections.appProfileMutex.Lock() err = saveObj.Write() collections.appProfileMutex.Unlock() if err != nil { log.Errorf("Error saving appProfile %s to db. Err: %v", saveObj.Key, err) return err } return nil }
go
func CreateAppProfile(obj *AppProfile) error { // Validate parameters err := ValidateAppProfile(obj) if err != nil { log.Errorf("ValidateAppProfile retruned error for: %+v. Err: %v", obj, err) return err } // Check if we handle this object if objCallbackHandler.AppProfileCb == nil { log.Errorf("No callback registered for appProfile object") return errors.New("Invalid object type") } saveObj := obj collections.appProfileMutex.Lock() key := collections.appProfiles[obj.Key] collections.appProfileMutex.Unlock() // Check if object already exists if key != nil { // Perform Update callback err = objCallbackHandler.AppProfileCb.AppProfileUpdate(collections.appProfiles[obj.Key], obj) if err != nil { log.Errorf("AppProfileUpdate retruned error for: %+v. Err: %v", obj, err) return err } // save the original object after update collections.appProfileMutex.Lock() saveObj = collections.appProfiles[obj.Key] collections.appProfileMutex.Unlock() } else { // save it in cache collections.appProfileMutex.Lock() collections.appProfiles[obj.Key] = obj collections.appProfileMutex.Unlock() // Perform Create callback err = objCallbackHandler.AppProfileCb.AppProfileCreate(obj) if err != nil { log.Errorf("AppProfileCreate retruned error for: %+v. Err: %v", obj, err) collections.appProfileMutex.Lock() delete(collections.appProfiles, obj.Key) collections.appProfileMutex.Unlock() return err } } // Write it to modeldb collections.appProfileMutex.Lock() err = saveObj.Write() collections.appProfileMutex.Unlock() if err != nil { log.Errorf("Error saving appProfile %s to db. Err: %v", saveObj.Key, err) return err } return nil }
[ "func", "CreateAppProfile", "(", "obj", "*", "AppProfile", ")", "error", "{", "// Validate parameters", "err", ":=", "ValidateAppProfile", "(", "obj", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "obj", ",", "err"...
// Create a appProfile object
[ "Create", "a", "appProfile", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L1539-L1599
7,867
contiv/netplugin
contivmodel/contivModel.go
FindAppProfile
func FindAppProfile(key string) *AppProfile { collections.appProfileMutex.Lock() defer collections.appProfileMutex.Unlock() obj := collections.appProfiles[key] if obj == nil { return nil } return obj }
go
func FindAppProfile(key string) *AppProfile { collections.appProfileMutex.Lock() defer collections.appProfileMutex.Unlock() obj := collections.appProfiles[key] if obj == nil { return nil } return obj }
[ "func", "FindAppProfile", "(", "key", "string", ")", "*", "AppProfile", "{", "collections", ".", "appProfileMutex", ".", "Lock", "(", ")", "\n", "defer", "collections", ".", "appProfileMutex", ".", "Unlock", "(", ")", "\n\n", "obj", ":=", "collections", ".",...
// Return a pointer to appProfile from collection
[ "Return", "a", "pointer", "to", "appProfile", "from", "collection" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L1602-L1612
7,868
contiv/netplugin
contivmodel/contivModel.go
DeleteAppProfile
func DeleteAppProfile(key string) error { collections.appProfileMutex.Lock() obj := collections.appProfiles[key] collections.appProfileMutex.Unlock() if obj == nil { log.Errorf("appProfile %s not found", key) return errors.New("appProfile not found") } // Check if we handle this object if objCallbackHandler.AppProfileCb == nil { log.Errorf("No callback registered for appProfile object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.AppProfileCb.AppProfileDelete(obj) if err != nil { log.Errorf("AppProfileDelete retruned error for: %+v. Err: %v", obj, err) return err } // delete it from modeldb collections.appProfileMutex.Lock() err = obj.Delete() collections.appProfileMutex.Unlock() if err != nil { log.Errorf("Error deleting appProfile %s. Err: %v", obj.Key, err) } // delete it from cache collections.appProfileMutex.Lock() delete(collections.appProfiles, key) collections.appProfileMutex.Unlock() return nil }
go
func DeleteAppProfile(key string) error { collections.appProfileMutex.Lock() obj := collections.appProfiles[key] collections.appProfileMutex.Unlock() if obj == nil { log.Errorf("appProfile %s not found", key) return errors.New("appProfile not found") } // Check if we handle this object if objCallbackHandler.AppProfileCb == nil { log.Errorf("No callback registered for appProfile object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.AppProfileCb.AppProfileDelete(obj) if err != nil { log.Errorf("AppProfileDelete retruned error for: %+v. Err: %v", obj, err) return err } // delete it from modeldb collections.appProfileMutex.Lock() err = obj.Delete() collections.appProfileMutex.Unlock() if err != nil { log.Errorf("Error deleting appProfile %s. Err: %v", obj.Key, err) } // delete it from cache collections.appProfileMutex.Lock() delete(collections.appProfiles, key) collections.appProfileMutex.Unlock() return nil }
[ "func", "DeleteAppProfile", "(", "key", "string", ")", "error", "{", "collections", ".", "appProfileMutex", ".", "Lock", "(", ")", "\n", "obj", ":=", "collections", ".", "appProfiles", "[", "key", "]", "\n", "collections", ".", "appProfileMutex", ".", "Unloc...
// Delete a appProfile object
[ "Delete", "a", "appProfile", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L1615-L1651
7,869
contiv/netplugin
contivmodel/contivModel.go
ValidateAppProfile
func ValidateAppProfile(obj *AppProfile) error { collections.appProfileMutex.Lock() defer collections.appProfileMutex.Unlock() // Validate key is correct keyStr := obj.TenantName + ":" + obj.AppProfileName if obj.Key != keyStr { log.Errorf("Expecting AppProfile Key: %s. Got: %s", keyStr, obj.Key) return errors.New("Invalid Key") } // Validate each field if len(obj.AppProfileName) > 64 { return errors.New("appProfileName string too long") } appProfileNameMatch := regexp.MustCompile("^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$") if appProfileNameMatch.MatchString(obj.AppProfileName) == false { return errors.New("appProfileName string invalid format") } if len(obj.TenantName) > 64 { return errors.New("tenantName string too long") } tenantNameMatch := regexp.MustCompile("^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$") if tenantNameMatch.MatchString(obj.TenantName) == false { return errors.New("tenantName string invalid format") } return nil }
go
func ValidateAppProfile(obj *AppProfile) error { collections.appProfileMutex.Lock() defer collections.appProfileMutex.Unlock() // Validate key is correct keyStr := obj.TenantName + ":" + obj.AppProfileName if obj.Key != keyStr { log.Errorf("Expecting AppProfile Key: %s. Got: %s", keyStr, obj.Key) return errors.New("Invalid Key") } // Validate each field if len(obj.AppProfileName) > 64 { return errors.New("appProfileName string too long") } appProfileNameMatch := regexp.MustCompile("^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$") if appProfileNameMatch.MatchString(obj.AppProfileName) == false { return errors.New("appProfileName string invalid format") } if len(obj.TenantName) > 64 { return errors.New("tenantName string too long") } tenantNameMatch := regexp.MustCompile("^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$") if tenantNameMatch.MatchString(obj.TenantName) == false { return errors.New("tenantName string invalid format") } return nil }
[ "func", "ValidateAppProfile", "(", "obj", "*", "AppProfile", ")", "error", "{", "collections", ".", "appProfileMutex", ".", "Lock", "(", ")", "\n", "defer", "collections", ".", "appProfileMutex", ".", "Unlock", "(", ")", "\n\n", "// Validate key is correct", "ke...
// Validate a appProfile object
[ "Validate", "a", "appProfile", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L1714-L1746
7,870
contiv/netplugin
contivmodel/contivModel.go
GetOperBgp
func GetOperBgp(obj *BgpInspect) error { // Check if we handle this object if objCallbackHandler.BgpCb == nil { log.Errorf("No callback registered for Bgp object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.BgpCb.BgpGetOper(obj) if err != nil { log.Errorf("BgpDelete retruned error for: %+v. Err: %v", obj, err) return err } return nil }
go
func GetOperBgp(obj *BgpInspect) error { // Check if we handle this object if objCallbackHandler.BgpCb == nil { log.Errorf("No callback registered for Bgp object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.BgpCb.BgpGetOper(obj) if err != nil { log.Errorf("BgpDelete retruned error for: %+v. Err: %v", obj, err) return err } return nil }
[ "func", "GetOperBgp", "(", "obj", "*", "BgpInspect", ")", "error", "{", "// Check if we handle this object", "if", "objCallbackHandler", ".", "BgpCb", "==", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ")", "\n", "return", "errors", ".", "New", "(", ...
// Get a BgpOper object
[ "Get", "a", "BgpOper", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L1774-L1789
7,871
contiv/netplugin
contivmodel/contivModel.go
CreateBgp
func CreateBgp(obj *Bgp) error { // Validate parameters err := ValidateBgp(obj) if err != nil { log.Errorf("ValidateBgp retruned error for: %+v. Err: %v", obj, err) return err } // Check if we handle this object if objCallbackHandler.BgpCb == nil { log.Errorf("No callback registered for Bgp object") return errors.New("Invalid object type") } saveObj := obj collections.BgpMutex.Lock() key := collections.Bgps[obj.Key] collections.BgpMutex.Unlock() // Check if object already exists if key != nil { // Perform Update callback err = objCallbackHandler.BgpCb.BgpUpdate(collections.Bgps[obj.Key], obj) if err != nil { log.Errorf("BgpUpdate retruned error for: %+v. Err: %v", obj, err) return err } // save the original object after update collections.BgpMutex.Lock() saveObj = collections.Bgps[obj.Key] collections.BgpMutex.Unlock() } else { // save it in cache collections.BgpMutex.Lock() collections.Bgps[obj.Key] = obj collections.BgpMutex.Unlock() // Perform Create callback err = objCallbackHandler.BgpCb.BgpCreate(obj) if err != nil { log.Errorf("BgpCreate retruned error for: %+v. Err: %v", obj, err) collections.BgpMutex.Lock() delete(collections.Bgps, obj.Key) collections.BgpMutex.Unlock() return err } } // Write it to modeldb collections.BgpMutex.Lock() err = saveObj.Write() collections.BgpMutex.Unlock() if err != nil { log.Errorf("Error saving Bgp %s to db. Err: %v", saveObj.Key, err) return err } return nil }
go
func CreateBgp(obj *Bgp) error { // Validate parameters err := ValidateBgp(obj) if err != nil { log.Errorf("ValidateBgp retruned error for: %+v. Err: %v", obj, err) return err } // Check if we handle this object if objCallbackHandler.BgpCb == nil { log.Errorf("No callback registered for Bgp object") return errors.New("Invalid object type") } saveObj := obj collections.BgpMutex.Lock() key := collections.Bgps[obj.Key] collections.BgpMutex.Unlock() // Check if object already exists if key != nil { // Perform Update callback err = objCallbackHandler.BgpCb.BgpUpdate(collections.Bgps[obj.Key], obj) if err != nil { log.Errorf("BgpUpdate retruned error for: %+v. Err: %v", obj, err) return err } // save the original object after update collections.BgpMutex.Lock() saveObj = collections.Bgps[obj.Key] collections.BgpMutex.Unlock() } else { // save it in cache collections.BgpMutex.Lock() collections.Bgps[obj.Key] = obj collections.BgpMutex.Unlock() // Perform Create callback err = objCallbackHandler.BgpCb.BgpCreate(obj) if err != nil { log.Errorf("BgpCreate retruned error for: %+v. Err: %v", obj, err) collections.BgpMutex.Lock() delete(collections.Bgps, obj.Key) collections.BgpMutex.Unlock() return err } } // Write it to modeldb collections.BgpMutex.Lock() err = saveObj.Write() collections.BgpMutex.Unlock() if err != nil { log.Errorf("Error saving Bgp %s to db. Err: %v", saveObj.Key, err) return err } return nil }
[ "func", "CreateBgp", "(", "obj", "*", "Bgp", ")", "error", "{", "// Validate parameters", "err", ":=", "ValidateBgp", "(", "obj", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "obj", ",", "err", ")", "\n", "r...
// Create a Bgp object
[ "Create", "a", "Bgp", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L1870-L1930
7,872
contiv/netplugin
contivmodel/contivModel.go
FindBgp
func FindBgp(key string) *Bgp { collections.BgpMutex.Lock() defer collections.BgpMutex.Unlock() obj := collections.Bgps[key] if obj == nil { return nil } return obj }
go
func FindBgp(key string) *Bgp { collections.BgpMutex.Lock() defer collections.BgpMutex.Unlock() obj := collections.Bgps[key] if obj == nil { return nil } return obj }
[ "func", "FindBgp", "(", "key", "string", ")", "*", "Bgp", "{", "collections", ".", "BgpMutex", ".", "Lock", "(", ")", "\n", "defer", "collections", ".", "BgpMutex", ".", "Unlock", "(", ")", "\n\n", "obj", ":=", "collections", ".", "Bgps", "[", "key", ...
// Return a pointer to Bgp from collection
[ "Return", "a", "pointer", "to", "Bgp", "from", "collection" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L1933-L1943
7,873
contiv/netplugin
contivmodel/contivModel.go
DeleteBgp
func DeleteBgp(key string) error { collections.BgpMutex.Lock() obj := collections.Bgps[key] collections.BgpMutex.Unlock() if obj == nil { log.Errorf("Bgp %s not found", key) return errors.New("Bgp not found") } // Check if we handle this object if objCallbackHandler.BgpCb == nil { log.Errorf("No callback registered for Bgp object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.BgpCb.BgpDelete(obj) if err != nil { log.Errorf("BgpDelete retruned error for: %+v. Err: %v", obj, err) return err } // delete it from modeldb collections.BgpMutex.Lock() err = obj.Delete() collections.BgpMutex.Unlock() if err != nil { log.Errorf("Error deleting Bgp %s. Err: %v", obj.Key, err) } // delete it from cache collections.BgpMutex.Lock() delete(collections.Bgps, key) collections.BgpMutex.Unlock() return nil }
go
func DeleteBgp(key string) error { collections.BgpMutex.Lock() obj := collections.Bgps[key] collections.BgpMutex.Unlock() if obj == nil { log.Errorf("Bgp %s not found", key) return errors.New("Bgp not found") } // Check if we handle this object if objCallbackHandler.BgpCb == nil { log.Errorf("No callback registered for Bgp object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.BgpCb.BgpDelete(obj) if err != nil { log.Errorf("BgpDelete retruned error for: %+v. Err: %v", obj, err) return err } // delete it from modeldb collections.BgpMutex.Lock() err = obj.Delete() collections.BgpMutex.Unlock() if err != nil { log.Errorf("Error deleting Bgp %s. Err: %v", obj.Key, err) } // delete it from cache collections.BgpMutex.Lock() delete(collections.Bgps, key) collections.BgpMutex.Unlock() return nil }
[ "func", "DeleteBgp", "(", "key", "string", ")", "error", "{", "collections", ".", "BgpMutex", ".", "Lock", "(", ")", "\n", "obj", ":=", "collections", ".", "Bgps", "[", "key", "]", "\n", "collections", ".", "BgpMutex", ".", "Unlock", "(", ")", "\n", ...
// Delete a Bgp object
[ "Delete", "a", "Bgp", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L1946-L1982
7,874
contiv/netplugin
contivmodel/contivModel.go
ValidateBgp
func ValidateBgp(obj *Bgp) error { collections.BgpMutex.Lock() defer collections.BgpMutex.Unlock() // Validate key is correct keyStr := obj.Hostname if obj.Key != keyStr { log.Errorf("Expecting Bgp Key: %s. Got: %s", keyStr, obj.Key) return errors.New("Invalid Key") } // Validate each field if len(obj.As) > 64 { return errors.New("as string too long") } if len(obj.Hostname) > 256 { return errors.New("hostname string too long") } hostnameMatch := regexp.MustCompile("^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$") if hostnameMatch.MatchString(obj.Hostname) == false { return errors.New("hostname string invalid format") } if len(obj.Neighbor) > 15 { return errors.New("neighbor string too long") } neighborMatch := regexp.MustCompile("^((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])(\\.(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})?$") if neighborMatch.MatchString(obj.Neighbor) == false { return errors.New("neighbor string invalid format") } if len(obj.NeighborAs) > 64 { return errors.New("neighbor-as string too long") } routeripMatch := regexp.MustCompile("^((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])(\\.(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})(\\-(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9]))?/(3[0-1]|2[0-9]|1[0-9]|[1-9])$") if routeripMatch.MatchString(obj.Routerip) == false { return errors.New("routerip string invalid format") } return nil }
go
func ValidateBgp(obj *Bgp) error { collections.BgpMutex.Lock() defer collections.BgpMutex.Unlock() // Validate key is correct keyStr := obj.Hostname if obj.Key != keyStr { log.Errorf("Expecting Bgp Key: %s. Got: %s", keyStr, obj.Key) return errors.New("Invalid Key") } // Validate each field if len(obj.As) > 64 { return errors.New("as string too long") } if len(obj.Hostname) > 256 { return errors.New("hostname string too long") } hostnameMatch := regexp.MustCompile("^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$") if hostnameMatch.MatchString(obj.Hostname) == false { return errors.New("hostname string invalid format") } if len(obj.Neighbor) > 15 { return errors.New("neighbor string too long") } neighborMatch := regexp.MustCompile("^((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])(\\.(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})?$") if neighborMatch.MatchString(obj.Neighbor) == false { return errors.New("neighbor string invalid format") } if len(obj.NeighborAs) > 64 { return errors.New("neighbor-as string too long") } routeripMatch := regexp.MustCompile("^((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])(\\.(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})(\\-(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9]))?/(3[0-1]|2[0-9]|1[0-9]|[1-9])$") if routeripMatch.MatchString(obj.Routerip) == false { return errors.New("routerip string invalid format") } return nil }
[ "func", "ValidateBgp", "(", "obj", "*", "Bgp", ")", "error", "{", "collections", ".", "BgpMutex", ".", "Lock", "(", ")", "\n", "defer", "collections", ".", "BgpMutex", ".", "Unlock", "(", ")", "\n\n", "// Validate key is correct", "keyStr", ":=", "obj", "....
// Validate a Bgp object
[ "Validate", "a", "Bgp", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L2045-L2090
7,875
contiv/netplugin
contivmodel/contivModel.go
GetOperEndpoint
func GetOperEndpoint(obj *EndpointInspect) error { // Check if we handle this object if objCallbackHandler.EndpointCb == nil { log.Errorf("No callback registered for endpoint object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.EndpointCb.EndpointGetOper(obj) if err != nil { log.Errorf("EndpointDelete retruned error for: %+v. Err: %v", obj, err) return err } return nil }
go
func GetOperEndpoint(obj *EndpointInspect) error { // Check if we handle this object if objCallbackHandler.EndpointCb == nil { log.Errorf("No callback registered for endpoint object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.EndpointCb.EndpointGetOper(obj) if err != nil { log.Errorf("EndpointDelete retruned error for: %+v. Err: %v", obj, err) return err } return nil }
[ "func", "GetOperEndpoint", "(", "obj", "*", "EndpointInspect", ")", "error", "{", "// Check if we handle this object", "if", "objCallbackHandler", ".", "EndpointCb", "==", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ")", "\n", "return", "errors", ".", "...
// Get a endpointOper object
[ "Get", "a", "endpointOper", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L2109-L2124
7,876
contiv/netplugin
contivmodel/contivModel.go
GetOperEndpointGroup
func GetOperEndpointGroup(obj *EndpointGroupInspect) error { // Check if we handle this object if objCallbackHandler.EndpointGroupCb == nil { log.Errorf("No callback registered for endpointGroup object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.EndpointGroupCb.EndpointGroupGetOper(obj) if err != nil { log.Errorf("EndpointGroupDelete retruned error for: %+v. Err: %v", obj, err) return err } return nil }
go
func GetOperEndpointGroup(obj *EndpointGroupInspect) error { // Check if we handle this object if objCallbackHandler.EndpointGroupCb == nil { log.Errorf("No callback registered for endpointGroup object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.EndpointGroupCb.EndpointGroupGetOper(obj) if err != nil { log.Errorf("EndpointGroupDelete retruned error for: %+v. Err: %v", obj, err) return err } return nil }
[ "func", "GetOperEndpointGroup", "(", "obj", "*", "EndpointGroupInspect", ")", "error", "{", "// Check if we handle this object", "if", "objCallbackHandler", ".", "EndpointGroupCb", "==", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ")", "\n", "return", "erro...
// Get a endpointGroupOper object
[ "Get", "a", "endpointGroupOper", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L2152-L2167
7,877
contiv/netplugin
contivmodel/contivModel.go
CreateEndpointGroup
func CreateEndpointGroup(obj *EndpointGroup) error { // Validate parameters err := ValidateEndpointGroup(obj) if err != nil { log.Errorf("ValidateEndpointGroup retruned error for: %+v. Err: %v", obj, err) return err } // Check if we handle this object if objCallbackHandler.EndpointGroupCb == nil { log.Errorf("No callback registered for endpointGroup object") return errors.New("Invalid object type") } saveObj := obj collections.endpointGroupMutex.Lock() key := collections.endpointGroups[obj.Key] collections.endpointGroupMutex.Unlock() // Check if object already exists if key != nil { // Perform Update callback err = objCallbackHandler.EndpointGroupCb.EndpointGroupUpdate(collections.endpointGroups[obj.Key], obj) if err != nil { log.Errorf("EndpointGroupUpdate retruned error for: %+v. Err: %v", obj, err) return err } // save the original object after update collections.endpointGroupMutex.Lock() saveObj = collections.endpointGroups[obj.Key] collections.endpointGroupMutex.Unlock() } else { // save it in cache collections.endpointGroupMutex.Lock() collections.endpointGroups[obj.Key] = obj collections.endpointGroupMutex.Unlock() // Perform Create callback err = objCallbackHandler.EndpointGroupCb.EndpointGroupCreate(obj) if err != nil { log.Errorf("EndpointGroupCreate retruned error for: %+v. Err: %v", obj, err) collections.endpointGroupMutex.Lock() delete(collections.endpointGroups, obj.Key) collections.endpointGroupMutex.Unlock() return err } } // Write it to modeldb collections.endpointGroupMutex.Lock() err = saveObj.Write() collections.endpointGroupMutex.Unlock() if err != nil { log.Errorf("Error saving endpointGroup %s to db. Err: %v", saveObj.Key, err) return err } return nil }
go
func CreateEndpointGroup(obj *EndpointGroup) error { // Validate parameters err := ValidateEndpointGroup(obj) if err != nil { log.Errorf("ValidateEndpointGroup retruned error for: %+v. Err: %v", obj, err) return err } // Check if we handle this object if objCallbackHandler.EndpointGroupCb == nil { log.Errorf("No callback registered for endpointGroup object") return errors.New("Invalid object type") } saveObj := obj collections.endpointGroupMutex.Lock() key := collections.endpointGroups[obj.Key] collections.endpointGroupMutex.Unlock() // Check if object already exists if key != nil { // Perform Update callback err = objCallbackHandler.EndpointGroupCb.EndpointGroupUpdate(collections.endpointGroups[obj.Key], obj) if err != nil { log.Errorf("EndpointGroupUpdate retruned error for: %+v. Err: %v", obj, err) return err } // save the original object after update collections.endpointGroupMutex.Lock() saveObj = collections.endpointGroups[obj.Key] collections.endpointGroupMutex.Unlock() } else { // save it in cache collections.endpointGroupMutex.Lock() collections.endpointGroups[obj.Key] = obj collections.endpointGroupMutex.Unlock() // Perform Create callback err = objCallbackHandler.EndpointGroupCb.EndpointGroupCreate(obj) if err != nil { log.Errorf("EndpointGroupCreate retruned error for: %+v. Err: %v", obj, err) collections.endpointGroupMutex.Lock() delete(collections.endpointGroups, obj.Key) collections.endpointGroupMutex.Unlock() return err } } // Write it to modeldb collections.endpointGroupMutex.Lock() err = saveObj.Write() collections.endpointGroupMutex.Unlock() if err != nil { log.Errorf("Error saving endpointGroup %s to db. Err: %v", saveObj.Key, err) return err } return nil }
[ "func", "CreateEndpointGroup", "(", "obj", "*", "EndpointGroup", ")", "error", "{", "// Validate parameters", "err", ":=", "ValidateEndpointGroup", "(", "obj", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "obj", ","...
// Create a endpointGroup object
[ "Create", "a", "endpointGroup", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L2248-L2308
7,878
contiv/netplugin
contivmodel/contivModel.go
FindEndpointGroup
func FindEndpointGroup(key string) *EndpointGroup { collections.endpointGroupMutex.Lock() defer collections.endpointGroupMutex.Unlock() obj := collections.endpointGroups[key] if obj == nil { return nil } return obj }
go
func FindEndpointGroup(key string) *EndpointGroup { collections.endpointGroupMutex.Lock() defer collections.endpointGroupMutex.Unlock() obj := collections.endpointGroups[key] if obj == nil { return nil } return obj }
[ "func", "FindEndpointGroup", "(", "key", "string", ")", "*", "EndpointGroup", "{", "collections", ".", "endpointGroupMutex", ".", "Lock", "(", ")", "\n", "defer", "collections", ".", "endpointGroupMutex", ".", "Unlock", "(", ")", "\n\n", "obj", ":=", "collecti...
// Return a pointer to endpointGroup from collection
[ "Return", "a", "pointer", "to", "endpointGroup", "from", "collection" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L2311-L2321
7,879
contiv/netplugin
contivmodel/contivModel.go
DeleteEndpointGroup
func DeleteEndpointGroup(key string) error { collections.endpointGroupMutex.Lock() obj := collections.endpointGroups[key] collections.endpointGroupMutex.Unlock() if obj == nil { log.Errorf("endpointGroup %s not found", key) return errors.New("endpointGroup not found") } // Check if we handle this object if objCallbackHandler.EndpointGroupCb == nil { log.Errorf("No callback registered for endpointGroup object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.EndpointGroupCb.EndpointGroupDelete(obj) if err != nil { log.Errorf("EndpointGroupDelete retruned error for: %+v. Err: %v", obj, err) return err } // delete it from modeldb collections.endpointGroupMutex.Lock() err = obj.Delete() collections.endpointGroupMutex.Unlock() if err != nil { log.Errorf("Error deleting endpointGroup %s. Err: %v", obj.Key, err) } // delete it from cache collections.endpointGroupMutex.Lock() delete(collections.endpointGroups, key) collections.endpointGroupMutex.Unlock() return nil }
go
func DeleteEndpointGroup(key string) error { collections.endpointGroupMutex.Lock() obj := collections.endpointGroups[key] collections.endpointGroupMutex.Unlock() if obj == nil { log.Errorf("endpointGroup %s not found", key) return errors.New("endpointGroup not found") } // Check if we handle this object if objCallbackHandler.EndpointGroupCb == nil { log.Errorf("No callback registered for endpointGroup object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.EndpointGroupCb.EndpointGroupDelete(obj) if err != nil { log.Errorf("EndpointGroupDelete retruned error for: %+v. Err: %v", obj, err) return err } // delete it from modeldb collections.endpointGroupMutex.Lock() err = obj.Delete() collections.endpointGroupMutex.Unlock() if err != nil { log.Errorf("Error deleting endpointGroup %s. Err: %v", obj.Key, err) } // delete it from cache collections.endpointGroupMutex.Lock() delete(collections.endpointGroups, key) collections.endpointGroupMutex.Unlock() return nil }
[ "func", "DeleteEndpointGroup", "(", "key", "string", ")", "error", "{", "collections", ".", "endpointGroupMutex", ".", "Lock", "(", ")", "\n", "obj", ":=", "collections", ".", "endpointGroups", "[", "key", "]", "\n", "collections", ".", "endpointGroupMutex", "...
// Delete a endpointGroup object
[ "Delete", "a", "endpointGroup", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L2324-L2360
7,880
contiv/netplugin
contivmodel/contivModel.go
ValidateEndpointGroup
func ValidateEndpointGroup(obj *EndpointGroup) error { collections.endpointGroupMutex.Lock() defer collections.endpointGroupMutex.Unlock() // Validate key is correct keyStr := obj.TenantName + ":" + obj.GroupName if obj.Key != keyStr { log.Errorf("Expecting EndpointGroup Key: %s. Got: %s", keyStr, obj.Key) return errors.New("Invalid Key") } // Validate each field if len(obj.CfgdTag) > 128 { return errors.New("cfgdTag string too long") } cfgdTagMatch := regexp.MustCompile("^((([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9]))?$") if cfgdTagMatch.MatchString(obj.CfgdTag) == false { return errors.New("cfgdTag string invalid format") } if len(obj.GroupName) > 64 { return errors.New("groupName string too long") } groupNameMatch := regexp.MustCompile("^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$") if groupNameMatch.MatchString(obj.GroupName) == false { return errors.New("groupName string invalid format") } ipPoolMatch := regexp.MustCompile("^$|^((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])(\\.(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})(\\-((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])(\\.(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))?$") if ipPoolMatch.MatchString(obj.IpPool) == false { return errors.New("ipPool string invalid format") } if len(obj.NetProfile) > 64 { return errors.New("netProfile string too long") } if len(obj.NetworkName) > 64 { return errors.New("networkName string too long") } networkNameMatch := regexp.MustCompile("^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$") if networkNameMatch.MatchString(obj.NetworkName) == false { return errors.New("networkName string invalid format") } if len(obj.TenantName) > 64 { return errors.New("tenantName string too long") } tenantNameMatch := regexp.MustCompile("^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$") if tenantNameMatch.MatchString(obj.TenantName) == false { return errors.New("tenantName string invalid format") } return nil }
go
func ValidateEndpointGroup(obj *EndpointGroup) error { collections.endpointGroupMutex.Lock() defer collections.endpointGroupMutex.Unlock() // Validate key is correct keyStr := obj.TenantName + ":" + obj.GroupName if obj.Key != keyStr { log.Errorf("Expecting EndpointGroup Key: %s. Got: %s", keyStr, obj.Key) return errors.New("Invalid Key") } // Validate each field if len(obj.CfgdTag) > 128 { return errors.New("cfgdTag string too long") } cfgdTagMatch := regexp.MustCompile("^((([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9]))?$") if cfgdTagMatch.MatchString(obj.CfgdTag) == false { return errors.New("cfgdTag string invalid format") } if len(obj.GroupName) > 64 { return errors.New("groupName string too long") } groupNameMatch := regexp.MustCompile("^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$") if groupNameMatch.MatchString(obj.GroupName) == false { return errors.New("groupName string invalid format") } ipPoolMatch := regexp.MustCompile("^$|^((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])(\\.(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})(\\-((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])(\\.(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))?$") if ipPoolMatch.MatchString(obj.IpPool) == false { return errors.New("ipPool string invalid format") } if len(obj.NetProfile) > 64 { return errors.New("netProfile string too long") } if len(obj.NetworkName) > 64 { return errors.New("networkName string too long") } networkNameMatch := regexp.MustCompile("^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$") if networkNameMatch.MatchString(obj.NetworkName) == false { return errors.New("networkName string invalid format") } if len(obj.TenantName) > 64 { return errors.New("tenantName string too long") } tenantNameMatch := regexp.MustCompile("^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$") if tenantNameMatch.MatchString(obj.TenantName) == false { return errors.New("tenantName string invalid format") } return nil }
[ "func", "ValidateEndpointGroup", "(", "obj", "*", "EndpointGroup", ")", "error", "{", "collections", ".", "endpointGroupMutex", ".", "Lock", "(", ")", "\n", "defer", "collections", ".", "endpointGroupMutex", ".", "Unlock", "(", ")", "\n\n", "// Validate key is cor...
// Validate a endpointGroup object
[ "Validate", "a", "endpointGroup", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L2423-L2482
7,881
contiv/netplugin
contivmodel/contivModel.go
CreateExtContractsGroup
func CreateExtContractsGroup(obj *ExtContractsGroup) error { // Validate parameters err := ValidateExtContractsGroup(obj) if err != nil { log.Errorf("ValidateExtContractsGroup retruned error for: %+v. Err: %v", obj, err) return err } // Check if we handle this object if objCallbackHandler.ExtContractsGroupCb == nil { log.Errorf("No callback registered for extContractsGroup object") return errors.New("Invalid object type") } saveObj := obj collections.extContractsGroupMutex.Lock() key := collections.extContractsGroups[obj.Key] collections.extContractsGroupMutex.Unlock() // Check if object already exists if key != nil { // Perform Update callback err = objCallbackHandler.ExtContractsGroupCb.ExtContractsGroupUpdate(collections.extContractsGroups[obj.Key], obj) if err != nil { log.Errorf("ExtContractsGroupUpdate retruned error for: %+v. Err: %v", obj, err) return err } // save the original object after update collections.extContractsGroupMutex.Lock() saveObj = collections.extContractsGroups[obj.Key] collections.extContractsGroupMutex.Unlock() } else { // save it in cache collections.extContractsGroupMutex.Lock() collections.extContractsGroups[obj.Key] = obj collections.extContractsGroupMutex.Unlock() // Perform Create callback err = objCallbackHandler.ExtContractsGroupCb.ExtContractsGroupCreate(obj) if err != nil { log.Errorf("ExtContractsGroupCreate retruned error for: %+v. Err: %v", obj, err) collections.extContractsGroupMutex.Lock() delete(collections.extContractsGroups, obj.Key) collections.extContractsGroupMutex.Unlock() return err } } // Write it to modeldb collections.extContractsGroupMutex.Lock() err = saveObj.Write() collections.extContractsGroupMutex.Unlock() if err != nil { log.Errorf("Error saving extContractsGroup %s to db. Err: %v", saveObj.Key, err) return err } return nil }
go
func CreateExtContractsGroup(obj *ExtContractsGroup) error { // Validate parameters err := ValidateExtContractsGroup(obj) if err != nil { log.Errorf("ValidateExtContractsGroup retruned error for: %+v. Err: %v", obj, err) return err } // Check if we handle this object if objCallbackHandler.ExtContractsGroupCb == nil { log.Errorf("No callback registered for extContractsGroup object") return errors.New("Invalid object type") } saveObj := obj collections.extContractsGroupMutex.Lock() key := collections.extContractsGroups[obj.Key] collections.extContractsGroupMutex.Unlock() // Check if object already exists if key != nil { // Perform Update callback err = objCallbackHandler.ExtContractsGroupCb.ExtContractsGroupUpdate(collections.extContractsGroups[obj.Key], obj) if err != nil { log.Errorf("ExtContractsGroupUpdate retruned error for: %+v. Err: %v", obj, err) return err } // save the original object after update collections.extContractsGroupMutex.Lock() saveObj = collections.extContractsGroups[obj.Key] collections.extContractsGroupMutex.Unlock() } else { // save it in cache collections.extContractsGroupMutex.Lock() collections.extContractsGroups[obj.Key] = obj collections.extContractsGroupMutex.Unlock() // Perform Create callback err = objCallbackHandler.ExtContractsGroupCb.ExtContractsGroupCreate(obj) if err != nil { log.Errorf("ExtContractsGroupCreate retruned error for: %+v. Err: %v", obj, err) collections.extContractsGroupMutex.Lock() delete(collections.extContractsGroups, obj.Key) collections.extContractsGroupMutex.Unlock() return err } } // Write it to modeldb collections.extContractsGroupMutex.Lock() err = saveObj.Write() collections.extContractsGroupMutex.Unlock() if err != nil { log.Errorf("Error saving extContractsGroup %s to db. Err: %v", saveObj.Key, err) return err } return nil }
[ "func", "CreateExtContractsGroup", "(", "obj", "*", "ExtContractsGroup", ")", "error", "{", "// Validate parameters", "err", ":=", "ValidateExtContractsGroup", "(", "obj", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", ...
// Create a extContractsGroup object
[ "Create", "a", "extContractsGroup", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L2583-L2643
7,882
contiv/netplugin
contivmodel/contivModel.go
FindExtContractsGroup
func FindExtContractsGroup(key string) *ExtContractsGroup { collections.extContractsGroupMutex.Lock() defer collections.extContractsGroupMutex.Unlock() obj := collections.extContractsGroups[key] if obj == nil { return nil } return obj }
go
func FindExtContractsGroup(key string) *ExtContractsGroup { collections.extContractsGroupMutex.Lock() defer collections.extContractsGroupMutex.Unlock() obj := collections.extContractsGroups[key] if obj == nil { return nil } return obj }
[ "func", "FindExtContractsGroup", "(", "key", "string", ")", "*", "ExtContractsGroup", "{", "collections", ".", "extContractsGroupMutex", ".", "Lock", "(", ")", "\n", "defer", "collections", ".", "extContractsGroupMutex", ".", "Unlock", "(", ")", "\n\n", "obj", "...
// Return a pointer to extContractsGroup from collection
[ "Return", "a", "pointer", "to", "extContractsGroup", "from", "collection" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L2646-L2656
7,883
contiv/netplugin
contivmodel/contivModel.go
DeleteExtContractsGroup
func DeleteExtContractsGroup(key string) error { collections.extContractsGroupMutex.Lock() obj := collections.extContractsGroups[key] collections.extContractsGroupMutex.Unlock() if obj == nil { log.Errorf("extContractsGroup %s not found", key) return errors.New("extContractsGroup not found") } // Check if we handle this object if objCallbackHandler.ExtContractsGroupCb == nil { log.Errorf("No callback registered for extContractsGroup object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.ExtContractsGroupCb.ExtContractsGroupDelete(obj) if err != nil { log.Errorf("ExtContractsGroupDelete retruned error for: %+v. Err: %v", obj, err) return err } // delete it from modeldb collections.extContractsGroupMutex.Lock() err = obj.Delete() collections.extContractsGroupMutex.Unlock() if err != nil { log.Errorf("Error deleting extContractsGroup %s. Err: %v", obj.Key, err) } // delete it from cache collections.extContractsGroupMutex.Lock() delete(collections.extContractsGroups, key) collections.extContractsGroupMutex.Unlock() return nil }
go
func DeleteExtContractsGroup(key string) error { collections.extContractsGroupMutex.Lock() obj := collections.extContractsGroups[key] collections.extContractsGroupMutex.Unlock() if obj == nil { log.Errorf("extContractsGroup %s not found", key) return errors.New("extContractsGroup not found") } // Check if we handle this object if objCallbackHandler.ExtContractsGroupCb == nil { log.Errorf("No callback registered for extContractsGroup object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.ExtContractsGroupCb.ExtContractsGroupDelete(obj) if err != nil { log.Errorf("ExtContractsGroupDelete retruned error for: %+v. Err: %v", obj, err) return err } // delete it from modeldb collections.extContractsGroupMutex.Lock() err = obj.Delete() collections.extContractsGroupMutex.Unlock() if err != nil { log.Errorf("Error deleting extContractsGroup %s. Err: %v", obj.Key, err) } // delete it from cache collections.extContractsGroupMutex.Lock() delete(collections.extContractsGroups, key) collections.extContractsGroupMutex.Unlock() return nil }
[ "func", "DeleteExtContractsGroup", "(", "key", "string", ")", "error", "{", "collections", ".", "extContractsGroupMutex", ".", "Lock", "(", ")", "\n", "obj", ":=", "collections", ".", "extContractsGroups", "[", "key", "]", "\n", "collections", ".", "extContracts...
// Delete a extContractsGroup object
[ "Delete", "a", "extContractsGroup", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L2659-L2695
7,884
contiv/netplugin
contivmodel/contivModel.go
ValidateExtContractsGroup
func ValidateExtContractsGroup(obj *ExtContractsGroup) error { collections.extContractsGroupMutex.Lock() defer collections.extContractsGroupMutex.Unlock() // Validate key is correct keyStr := obj.TenantName + ":" + obj.ContractsGroupName if obj.Key != keyStr { log.Errorf("Expecting ExtContractsGroup Key: %s. Got: %s", keyStr, obj.Key) return errors.New("Invalid Key") } // Validate each field if len(obj.ContractsGroupName) > 64 { return errors.New("contractsGroupName string too long") } contractsGroupNameMatch := regexp.MustCompile("^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$") if contractsGroupNameMatch.MatchString(obj.ContractsGroupName) == false { return errors.New("contractsGroupName string invalid format") } if len(obj.TenantName) > 64 { return errors.New("tenantName string too long") } tenantNameMatch := regexp.MustCompile("^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$") if tenantNameMatch.MatchString(obj.TenantName) == false { return errors.New("tenantName string invalid format") } return nil }
go
func ValidateExtContractsGroup(obj *ExtContractsGroup) error { collections.extContractsGroupMutex.Lock() defer collections.extContractsGroupMutex.Unlock() // Validate key is correct keyStr := obj.TenantName + ":" + obj.ContractsGroupName if obj.Key != keyStr { log.Errorf("Expecting ExtContractsGroup Key: %s. Got: %s", keyStr, obj.Key) return errors.New("Invalid Key") } // Validate each field if len(obj.ContractsGroupName) > 64 { return errors.New("contractsGroupName string too long") } contractsGroupNameMatch := regexp.MustCompile("^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$") if contractsGroupNameMatch.MatchString(obj.ContractsGroupName) == false { return errors.New("contractsGroupName string invalid format") } if len(obj.TenantName) > 64 { return errors.New("tenantName string too long") } tenantNameMatch := regexp.MustCompile("^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$") if tenantNameMatch.MatchString(obj.TenantName) == false { return errors.New("tenantName string invalid format") } return nil }
[ "func", "ValidateExtContractsGroup", "(", "obj", "*", "ExtContractsGroup", ")", "error", "{", "collections", ".", "extContractsGroupMutex", ".", "Lock", "(", ")", "\n", "defer", "collections", ".", "extContractsGroupMutex", ".", "Unlock", "(", ")", "\n\n", "// Val...
// Validate a extContractsGroup object
[ "Validate", "a", "extContractsGroup", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L2758-L2790
7,885
contiv/netplugin
contivmodel/contivModel.go
GetOperGlobal
func GetOperGlobal(obj *GlobalInspect) error { // Check if we handle this object if objCallbackHandler.GlobalCb == nil { log.Errorf("No callback registered for global object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.GlobalCb.GlobalGetOper(obj) if err != nil { log.Errorf("GlobalDelete retruned error for: %+v. Err: %v", obj, err) return err } return nil }
go
func GetOperGlobal(obj *GlobalInspect) error { // Check if we handle this object if objCallbackHandler.GlobalCb == nil { log.Errorf("No callback registered for global object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.GlobalCb.GlobalGetOper(obj) if err != nil { log.Errorf("GlobalDelete retruned error for: %+v. Err: %v", obj, err) return err } return nil }
[ "func", "GetOperGlobal", "(", "obj", "*", "GlobalInspect", ")", "error", "{", "// Check if we handle this object", "if", "objCallbackHandler", ".", "GlobalCb", "==", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ")", "\n", "return", "errors", ".", "New", ...
// Get a globalOper object
[ "Get", "a", "globalOper", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L2818-L2833
7,886
contiv/netplugin
contivmodel/contivModel.go
CreateGlobal
func CreateGlobal(obj *Global) error { // Validate parameters err := ValidateGlobal(obj) if err != nil { log.Errorf("ValidateGlobal retruned error for: %+v. Err: %v", obj, err) return err } // Check if we handle this object if objCallbackHandler.GlobalCb == nil { log.Errorf("No callback registered for global object") return errors.New("Invalid object type") } saveObj := obj collections.globalMutex.Lock() key := collections.globals[obj.Key] collections.globalMutex.Unlock() // Check if object already exists if key != nil { // Perform Update callback err = objCallbackHandler.GlobalCb.GlobalUpdate(collections.globals[obj.Key], obj) if err != nil { log.Errorf("GlobalUpdate retruned error for: %+v. Err: %v", obj, err) return err } // save the original object after update collections.globalMutex.Lock() saveObj = collections.globals[obj.Key] collections.globalMutex.Unlock() } else { // save it in cache collections.globalMutex.Lock() collections.globals[obj.Key] = obj collections.globalMutex.Unlock() // Perform Create callback err = objCallbackHandler.GlobalCb.GlobalCreate(obj) if err != nil { log.Errorf("GlobalCreate retruned error for: %+v. Err: %v", obj, err) collections.globalMutex.Lock() delete(collections.globals, obj.Key) collections.globalMutex.Unlock() return err } } // Write it to modeldb collections.globalMutex.Lock() err = saveObj.Write() collections.globalMutex.Unlock() if err != nil { log.Errorf("Error saving global %s to db. Err: %v", saveObj.Key, err) return err } return nil }
go
func CreateGlobal(obj *Global) error { // Validate parameters err := ValidateGlobal(obj) if err != nil { log.Errorf("ValidateGlobal retruned error for: %+v. Err: %v", obj, err) return err } // Check if we handle this object if objCallbackHandler.GlobalCb == nil { log.Errorf("No callback registered for global object") return errors.New("Invalid object type") } saveObj := obj collections.globalMutex.Lock() key := collections.globals[obj.Key] collections.globalMutex.Unlock() // Check if object already exists if key != nil { // Perform Update callback err = objCallbackHandler.GlobalCb.GlobalUpdate(collections.globals[obj.Key], obj) if err != nil { log.Errorf("GlobalUpdate retruned error for: %+v. Err: %v", obj, err) return err } // save the original object after update collections.globalMutex.Lock() saveObj = collections.globals[obj.Key] collections.globalMutex.Unlock() } else { // save it in cache collections.globalMutex.Lock() collections.globals[obj.Key] = obj collections.globalMutex.Unlock() // Perform Create callback err = objCallbackHandler.GlobalCb.GlobalCreate(obj) if err != nil { log.Errorf("GlobalCreate retruned error for: %+v. Err: %v", obj, err) collections.globalMutex.Lock() delete(collections.globals, obj.Key) collections.globalMutex.Unlock() return err } } // Write it to modeldb collections.globalMutex.Lock() err = saveObj.Write() collections.globalMutex.Unlock() if err != nil { log.Errorf("Error saving global %s to db. Err: %v", saveObj.Key, err) return err } return nil }
[ "func", "CreateGlobal", "(", "obj", "*", "Global", ")", "error", "{", "// Validate parameters", "err", ":=", "ValidateGlobal", "(", "obj", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "obj", ",", "err", ")", "...
// Create a global object
[ "Create", "a", "global", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L2914-L2974
7,887
contiv/netplugin
contivmodel/contivModel.go
FindGlobal
func FindGlobal(key string) *Global { collections.globalMutex.Lock() defer collections.globalMutex.Unlock() obj := collections.globals[key] if obj == nil { return nil } return obj }
go
func FindGlobal(key string) *Global { collections.globalMutex.Lock() defer collections.globalMutex.Unlock() obj := collections.globals[key] if obj == nil { return nil } return obj }
[ "func", "FindGlobal", "(", "key", "string", ")", "*", "Global", "{", "collections", ".", "globalMutex", ".", "Lock", "(", ")", "\n", "defer", "collections", ".", "globalMutex", ".", "Unlock", "(", ")", "\n\n", "obj", ":=", "collections", ".", "globals", ...
// Return a pointer to global from collection
[ "Return", "a", "pointer", "to", "global", "from", "collection" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L2977-L2987
7,888
contiv/netplugin
contivmodel/contivModel.go
DeleteGlobal
func DeleteGlobal(key string) error { collections.globalMutex.Lock() obj := collections.globals[key] collections.globalMutex.Unlock() if obj == nil { log.Errorf("global %s not found", key) return errors.New("global not found") } // Check if we handle this object if objCallbackHandler.GlobalCb == nil { log.Errorf("No callback registered for global object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.GlobalCb.GlobalDelete(obj) if err != nil { log.Errorf("GlobalDelete retruned error for: %+v. Err: %v", obj, err) return err } // delete it from modeldb collections.globalMutex.Lock() err = obj.Delete() collections.globalMutex.Unlock() if err != nil { log.Errorf("Error deleting global %s. Err: %v", obj.Key, err) } // delete it from cache collections.globalMutex.Lock() delete(collections.globals, key) collections.globalMutex.Unlock() return nil }
go
func DeleteGlobal(key string) error { collections.globalMutex.Lock() obj := collections.globals[key] collections.globalMutex.Unlock() if obj == nil { log.Errorf("global %s not found", key) return errors.New("global not found") } // Check if we handle this object if objCallbackHandler.GlobalCb == nil { log.Errorf("No callback registered for global object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.GlobalCb.GlobalDelete(obj) if err != nil { log.Errorf("GlobalDelete retruned error for: %+v. Err: %v", obj, err) return err } // delete it from modeldb collections.globalMutex.Lock() err = obj.Delete() collections.globalMutex.Unlock() if err != nil { log.Errorf("Error deleting global %s. Err: %v", obj.Key, err) } // delete it from cache collections.globalMutex.Lock() delete(collections.globals, key) collections.globalMutex.Unlock() return nil }
[ "func", "DeleteGlobal", "(", "key", "string", ")", "error", "{", "collections", ".", "globalMutex", ".", "Lock", "(", ")", "\n", "obj", ":=", "collections", ".", "globals", "[", "key", "]", "\n", "collections", ".", "globalMutex", ".", "Unlock", "(", ")"...
// Delete a global object
[ "Delete", "a", "global", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L2990-L3026
7,889
contiv/netplugin
contivmodel/contivModel.go
ValidateGlobal
func ValidateGlobal(obj *Global) error { collections.globalMutex.Lock() defer collections.globalMutex.Unlock() // Validate key is correct keyStr := obj.Name if obj.Key != keyStr { log.Errorf("Expecting Global Key: %s. Got: %s", keyStr, obj.Key) return errors.New("Invalid Key") } // Validate each field if len(obj.ArpMode) > 64 { return errors.New("arpMode string too long") } arpModeMatch := regexp.MustCompile("^(proxy|flood)?$") if arpModeMatch.MatchString(obj.ArpMode) == false { return errors.New("arpMode string invalid format") } if len(obj.FwdMode) > 64 { return errors.New("fwdMode string too long") } fwdModeMatch := regexp.MustCompile("^(bridge|routing)?$") if fwdModeMatch.MatchString(obj.FwdMode) == false { return errors.New("fwdMode string invalid format") } if len(obj.Name) > 64 { return errors.New("name string too long") } nameMatch := regexp.MustCompile("^(global)$") if nameMatch.MatchString(obj.Name) == false { return errors.New("name string invalid format") } if len(obj.NetworkInfraType) > 64 { return errors.New("networkInfraType string too long") } networkInfraTypeMatch := regexp.MustCompile("^(aci|aci-opflex|default)?$") if networkInfraTypeMatch.MatchString(obj.NetworkInfraType) == false { return errors.New("networkInfraType string invalid format") } pvtSubnetMatch := regexp.MustCompile("^((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])(\\.(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})/16$") if pvtSubnetMatch.MatchString(obj.PvtSubnet) == false { return errors.New("pvtSubnet string invalid format") } vlansMatch := regexp.MustCompile("^([0-9]{1,4}?-[0-9]{1,4}?)$") if vlansMatch.MatchString(obj.Vlans) == false { return errors.New("vlans string invalid format") } vxlansMatch := regexp.MustCompile("^([0-9]{1,8}?-[0-9]{1,8}?)$") if vxlansMatch.MatchString(obj.Vxlans) == false { return errors.New("vxlans string invalid format") } return nil }
go
func ValidateGlobal(obj *Global) error { collections.globalMutex.Lock() defer collections.globalMutex.Unlock() // Validate key is correct keyStr := obj.Name if obj.Key != keyStr { log.Errorf("Expecting Global Key: %s. Got: %s", keyStr, obj.Key) return errors.New("Invalid Key") } // Validate each field if len(obj.ArpMode) > 64 { return errors.New("arpMode string too long") } arpModeMatch := regexp.MustCompile("^(proxy|flood)?$") if arpModeMatch.MatchString(obj.ArpMode) == false { return errors.New("arpMode string invalid format") } if len(obj.FwdMode) > 64 { return errors.New("fwdMode string too long") } fwdModeMatch := regexp.MustCompile("^(bridge|routing)?$") if fwdModeMatch.MatchString(obj.FwdMode) == false { return errors.New("fwdMode string invalid format") } if len(obj.Name) > 64 { return errors.New("name string too long") } nameMatch := regexp.MustCompile("^(global)$") if nameMatch.MatchString(obj.Name) == false { return errors.New("name string invalid format") } if len(obj.NetworkInfraType) > 64 { return errors.New("networkInfraType string too long") } networkInfraTypeMatch := regexp.MustCompile("^(aci|aci-opflex|default)?$") if networkInfraTypeMatch.MatchString(obj.NetworkInfraType) == false { return errors.New("networkInfraType string invalid format") } pvtSubnetMatch := regexp.MustCompile("^((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])(\\.(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})/16$") if pvtSubnetMatch.MatchString(obj.PvtSubnet) == false { return errors.New("pvtSubnet string invalid format") } vlansMatch := regexp.MustCompile("^([0-9]{1,4}?-[0-9]{1,4}?)$") if vlansMatch.MatchString(obj.Vlans) == false { return errors.New("vlans string invalid format") } vxlansMatch := regexp.MustCompile("^([0-9]{1,8}?-[0-9]{1,8}?)$") if vxlansMatch.MatchString(obj.Vxlans) == false { return errors.New("vxlans string invalid format") } return nil }
[ "func", "ValidateGlobal", "(", "obj", "*", "Global", ")", "error", "{", "collections", ".", "globalMutex", ".", "Lock", "(", ")", "\n", "defer", "collections", ".", "globalMutex", ".", "Unlock", "(", ")", "\n\n", "// Validate key is correct", "keyStr", ":=", ...
// Validate a global object
[ "Validate", "a", "global", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L3089-L3154
7,890
contiv/netplugin
contivmodel/contivModel.go
CreateNetprofile
func CreateNetprofile(obj *Netprofile) error { // Validate parameters err := ValidateNetprofile(obj) if err != nil { log.Errorf("ValidateNetprofile retruned error for: %+v. Err: %v", obj, err) return err } // Check if we handle this object if objCallbackHandler.NetprofileCb == nil { log.Errorf("No callback registered for netprofile object") return errors.New("Invalid object type") } saveObj := obj collections.netprofileMutex.Lock() key := collections.netprofiles[obj.Key] collections.netprofileMutex.Unlock() // Check if object already exists if key != nil { // Perform Update callback err = objCallbackHandler.NetprofileCb.NetprofileUpdate(collections.netprofiles[obj.Key], obj) if err != nil { log.Errorf("NetprofileUpdate retruned error for: %+v. Err: %v", obj, err) return err } // save the original object after update collections.netprofileMutex.Lock() saveObj = collections.netprofiles[obj.Key] collections.netprofileMutex.Unlock() } else { // save it in cache collections.netprofileMutex.Lock() collections.netprofiles[obj.Key] = obj collections.netprofileMutex.Unlock() // Perform Create callback err = objCallbackHandler.NetprofileCb.NetprofileCreate(obj) if err != nil { log.Errorf("NetprofileCreate retruned error for: %+v. Err: %v", obj, err) collections.netprofileMutex.Lock() delete(collections.netprofiles, obj.Key) collections.netprofileMutex.Unlock() return err } } // Write it to modeldb collections.netprofileMutex.Lock() err = saveObj.Write() collections.netprofileMutex.Unlock() if err != nil { log.Errorf("Error saving netprofile %s to db. Err: %v", saveObj.Key, err) return err } return nil }
go
func CreateNetprofile(obj *Netprofile) error { // Validate parameters err := ValidateNetprofile(obj) if err != nil { log.Errorf("ValidateNetprofile retruned error for: %+v. Err: %v", obj, err) return err } // Check if we handle this object if objCallbackHandler.NetprofileCb == nil { log.Errorf("No callback registered for netprofile object") return errors.New("Invalid object type") } saveObj := obj collections.netprofileMutex.Lock() key := collections.netprofiles[obj.Key] collections.netprofileMutex.Unlock() // Check if object already exists if key != nil { // Perform Update callback err = objCallbackHandler.NetprofileCb.NetprofileUpdate(collections.netprofiles[obj.Key], obj) if err != nil { log.Errorf("NetprofileUpdate retruned error for: %+v. Err: %v", obj, err) return err } // save the original object after update collections.netprofileMutex.Lock() saveObj = collections.netprofiles[obj.Key] collections.netprofileMutex.Unlock() } else { // save it in cache collections.netprofileMutex.Lock() collections.netprofiles[obj.Key] = obj collections.netprofileMutex.Unlock() // Perform Create callback err = objCallbackHandler.NetprofileCb.NetprofileCreate(obj) if err != nil { log.Errorf("NetprofileCreate retruned error for: %+v. Err: %v", obj, err) collections.netprofileMutex.Lock() delete(collections.netprofiles, obj.Key) collections.netprofileMutex.Unlock() return err } } // Write it to modeldb collections.netprofileMutex.Lock() err = saveObj.Write() collections.netprofileMutex.Unlock() if err != nil { log.Errorf("Error saving netprofile %s to db. Err: %v", saveObj.Key, err) return err } return nil }
[ "func", "CreateNetprofile", "(", "obj", "*", "Netprofile", ")", "error", "{", "// Validate parameters", "err", ":=", "ValidateNetprofile", "(", "obj", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "obj", ",", "err"...
// Create a netprofile object
[ "Create", "a", "netprofile", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L3255-L3315
7,891
contiv/netplugin
contivmodel/contivModel.go
FindNetprofile
func FindNetprofile(key string) *Netprofile { collections.netprofileMutex.Lock() defer collections.netprofileMutex.Unlock() obj := collections.netprofiles[key] if obj == nil { return nil } return obj }
go
func FindNetprofile(key string) *Netprofile { collections.netprofileMutex.Lock() defer collections.netprofileMutex.Unlock() obj := collections.netprofiles[key] if obj == nil { return nil } return obj }
[ "func", "FindNetprofile", "(", "key", "string", ")", "*", "Netprofile", "{", "collections", ".", "netprofileMutex", ".", "Lock", "(", ")", "\n", "defer", "collections", ".", "netprofileMutex", ".", "Unlock", "(", ")", "\n\n", "obj", ":=", "collections", ".",...
// Return a pointer to netprofile from collection
[ "Return", "a", "pointer", "to", "netprofile", "from", "collection" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L3318-L3328
7,892
contiv/netplugin
contivmodel/contivModel.go
DeleteNetprofile
func DeleteNetprofile(key string) error { collections.netprofileMutex.Lock() obj := collections.netprofiles[key] collections.netprofileMutex.Unlock() if obj == nil { log.Errorf("netprofile %s not found", key) return errors.New("netprofile not found") } // Check if we handle this object if objCallbackHandler.NetprofileCb == nil { log.Errorf("No callback registered for netprofile object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.NetprofileCb.NetprofileDelete(obj) if err != nil { log.Errorf("NetprofileDelete retruned error for: %+v. Err: %v", obj, err) return err } // delete it from modeldb collections.netprofileMutex.Lock() err = obj.Delete() collections.netprofileMutex.Unlock() if err != nil { log.Errorf("Error deleting netprofile %s. Err: %v", obj.Key, err) } // delete it from cache collections.netprofileMutex.Lock() delete(collections.netprofiles, key) collections.netprofileMutex.Unlock() return nil }
go
func DeleteNetprofile(key string) error { collections.netprofileMutex.Lock() obj := collections.netprofiles[key] collections.netprofileMutex.Unlock() if obj == nil { log.Errorf("netprofile %s not found", key) return errors.New("netprofile not found") } // Check if we handle this object if objCallbackHandler.NetprofileCb == nil { log.Errorf("No callback registered for netprofile object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.NetprofileCb.NetprofileDelete(obj) if err != nil { log.Errorf("NetprofileDelete retruned error for: %+v. Err: %v", obj, err) return err } // delete it from modeldb collections.netprofileMutex.Lock() err = obj.Delete() collections.netprofileMutex.Unlock() if err != nil { log.Errorf("Error deleting netprofile %s. Err: %v", obj.Key, err) } // delete it from cache collections.netprofileMutex.Lock() delete(collections.netprofiles, key) collections.netprofileMutex.Unlock() return nil }
[ "func", "DeleteNetprofile", "(", "key", "string", ")", "error", "{", "collections", ".", "netprofileMutex", ".", "Lock", "(", ")", "\n", "obj", ":=", "collections", ".", "netprofiles", "[", "key", "]", "\n", "collections", ".", "netprofileMutex", ".", "Unloc...
// Delete a netprofile object
[ "Delete", "a", "netprofile", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L3331-L3367
7,893
contiv/netplugin
contivmodel/contivModel.go
ValidateNetprofile
func ValidateNetprofile(obj *Netprofile) error { collections.netprofileMutex.Lock() defer collections.netprofileMutex.Unlock() // Validate key is correct keyStr := obj.TenantName + ":" + obj.ProfileName if obj.Key != keyStr { log.Errorf("Expecting Netprofile Key: %s. Got: %s", keyStr, obj.Key) return errors.New("Invalid Key") } // Validate each field if obj.DSCP == 0 { obj.DSCP = 0 } if obj.DSCP > 63 { return errors.New("DSCP Value Out of bound") } if len(obj.Bandwidth) > 64 { return errors.New("bandwidth string too long") } bandwidthMatch := regexp.MustCompile("^([1-9][0-9]* (([kmgKMG{1}]bps)|[kmgKMG{1}]|(kb|Kb|Gb|gb|Mb|mb)))?$|^([1-9][0-9]*(((k|m|g|K|G|M)bps)|(k|m|g|K|M|G)|(kb|Kb|Gb|gb|Mb|mb)))?$") if bandwidthMatch.MatchString(obj.Bandwidth) == false { return errors.New("bandwidth string invalid format") } if obj.Burst > 10486 { return errors.New("burst Value Out of bound") } if len(obj.ProfileName) > 64 { return errors.New("profileName string too long") } return nil }
go
func ValidateNetprofile(obj *Netprofile) error { collections.netprofileMutex.Lock() defer collections.netprofileMutex.Unlock() // Validate key is correct keyStr := obj.TenantName + ":" + obj.ProfileName if obj.Key != keyStr { log.Errorf("Expecting Netprofile Key: %s. Got: %s", keyStr, obj.Key) return errors.New("Invalid Key") } // Validate each field if obj.DSCP == 0 { obj.DSCP = 0 } if obj.DSCP > 63 { return errors.New("DSCP Value Out of bound") } if len(obj.Bandwidth) > 64 { return errors.New("bandwidth string too long") } bandwidthMatch := regexp.MustCompile("^([1-9][0-9]* (([kmgKMG{1}]bps)|[kmgKMG{1}]|(kb|Kb|Gb|gb|Mb|mb)))?$|^([1-9][0-9]*(((k|m|g|K|G|M)bps)|(k|m|g|K|M|G)|(kb|Kb|Gb|gb|Mb|mb)))?$") if bandwidthMatch.MatchString(obj.Bandwidth) == false { return errors.New("bandwidth string invalid format") } if obj.Burst > 10486 { return errors.New("burst Value Out of bound") } if len(obj.ProfileName) > 64 { return errors.New("profileName string too long") } return nil }
[ "func", "ValidateNetprofile", "(", "obj", "*", "Netprofile", ")", "error", "{", "collections", ".", "netprofileMutex", ".", "Lock", "(", ")", "\n", "defer", "collections", ".", "netprofileMutex", ".", "Unlock", "(", ")", "\n\n", "// Validate key is correct", "ke...
// Validate a netprofile object
[ "Validate", "a", "netprofile", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L3430-L3469
7,894
contiv/netplugin
contivmodel/contivModel.go
GetOperNetwork
func GetOperNetwork(obj *NetworkInspect) error { // Check if we handle this object if objCallbackHandler.NetworkCb == nil { log.Errorf("No callback registered for network object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.NetworkCb.NetworkGetOper(obj) if err != nil { log.Errorf("NetworkDelete retruned error for: %+v. Err: %v", obj, err) return err } return nil }
go
func GetOperNetwork(obj *NetworkInspect) error { // Check if we handle this object if objCallbackHandler.NetworkCb == nil { log.Errorf("No callback registered for network object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.NetworkCb.NetworkGetOper(obj) if err != nil { log.Errorf("NetworkDelete retruned error for: %+v. Err: %v", obj, err) return err } return nil }
[ "func", "GetOperNetwork", "(", "obj", "*", "NetworkInspect", ")", "error", "{", "// Check if we handle this object", "if", "objCallbackHandler", ".", "NetworkCb", "==", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ")", "\n", "return", "errors", ".", "New...
// Get a networkOper object
[ "Get", "a", "networkOper", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L3497-L3512
7,895
contiv/netplugin
contivmodel/contivModel.go
CreateNetwork
func CreateNetwork(obj *Network) error { // Validate parameters err := ValidateNetwork(obj) if err != nil { log.Errorf("ValidateNetwork retruned error for: %+v. Err: %v", obj, err) return err } // Check if we handle this object if objCallbackHandler.NetworkCb == nil { log.Errorf("No callback registered for network object") return errors.New("Invalid object type") } saveObj := obj collections.networkMutex.Lock() key := collections.networks[obj.Key] collections.networkMutex.Unlock() // Check if object already exists if key != nil { // Perform Update callback err = objCallbackHandler.NetworkCb.NetworkUpdate(collections.networks[obj.Key], obj) if err != nil { log.Errorf("NetworkUpdate retruned error for: %+v. Err: %v", obj, err) return err } // save the original object after update collections.networkMutex.Lock() saveObj = collections.networks[obj.Key] collections.networkMutex.Unlock() } else { // save it in cache collections.networkMutex.Lock() collections.networks[obj.Key] = obj collections.networkMutex.Unlock() // Perform Create callback err = objCallbackHandler.NetworkCb.NetworkCreate(obj) if err != nil { log.Errorf("NetworkCreate retruned error for: %+v. Err: %v", obj, err) collections.networkMutex.Lock() delete(collections.networks, obj.Key) collections.networkMutex.Unlock() return err } } // Write it to modeldb collections.networkMutex.Lock() err = saveObj.Write() collections.networkMutex.Unlock() if err != nil { log.Errorf("Error saving network %s to db. Err: %v", saveObj.Key, err) return err } return nil }
go
func CreateNetwork(obj *Network) error { // Validate parameters err := ValidateNetwork(obj) if err != nil { log.Errorf("ValidateNetwork retruned error for: %+v. Err: %v", obj, err) return err } // Check if we handle this object if objCallbackHandler.NetworkCb == nil { log.Errorf("No callback registered for network object") return errors.New("Invalid object type") } saveObj := obj collections.networkMutex.Lock() key := collections.networks[obj.Key] collections.networkMutex.Unlock() // Check if object already exists if key != nil { // Perform Update callback err = objCallbackHandler.NetworkCb.NetworkUpdate(collections.networks[obj.Key], obj) if err != nil { log.Errorf("NetworkUpdate retruned error for: %+v. Err: %v", obj, err) return err } // save the original object after update collections.networkMutex.Lock() saveObj = collections.networks[obj.Key] collections.networkMutex.Unlock() } else { // save it in cache collections.networkMutex.Lock() collections.networks[obj.Key] = obj collections.networkMutex.Unlock() // Perform Create callback err = objCallbackHandler.NetworkCb.NetworkCreate(obj) if err != nil { log.Errorf("NetworkCreate retruned error for: %+v. Err: %v", obj, err) collections.networkMutex.Lock() delete(collections.networks, obj.Key) collections.networkMutex.Unlock() return err } } // Write it to modeldb collections.networkMutex.Lock() err = saveObj.Write() collections.networkMutex.Unlock() if err != nil { log.Errorf("Error saving network %s to db. Err: %v", saveObj.Key, err) return err } return nil }
[ "func", "CreateNetwork", "(", "obj", "*", "Network", ")", "error", "{", "// Validate parameters", "err", ":=", "ValidateNetwork", "(", "obj", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "obj", ",", "err", ")", ...
// Create a network object
[ "Create", "a", "network", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L3593-L3653
7,896
contiv/netplugin
contivmodel/contivModel.go
FindNetwork
func FindNetwork(key string) *Network { collections.networkMutex.Lock() defer collections.networkMutex.Unlock() obj := collections.networks[key] if obj == nil { return nil } return obj }
go
func FindNetwork(key string) *Network { collections.networkMutex.Lock() defer collections.networkMutex.Unlock() obj := collections.networks[key] if obj == nil { return nil } return obj }
[ "func", "FindNetwork", "(", "key", "string", ")", "*", "Network", "{", "collections", ".", "networkMutex", ".", "Lock", "(", ")", "\n", "defer", "collections", ".", "networkMutex", ".", "Unlock", "(", ")", "\n\n", "obj", ":=", "collections", ".", "networks...
// Return a pointer to network from collection
[ "Return", "a", "pointer", "to", "network", "from", "collection" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L3656-L3666
7,897
contiv/netplugin
contivmodel/contivModel.go
DeleteNetwork
func DeleteNetwork(key string) error { collections.networkMutex.Lock() obj := collections.networks[key] collections.networkMutex.Unlock() if obj == nil { log.Errorf("network %s not found", key) return errors.New("network not found") } // Check if we handle this object if objCallbackHandler.NetworkCb == nil { log.Errorf("No callback registered for network object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.NetworkCb.NetworkDelete(obj) if err != nil { log.Errorf("NetworkDelete retruned error for: %+v. Err: %v", obj, err) return err } // delete it from modeldb collections.networkMutex.Lock() err = obj.Delete() collections.networkMutex.Unlock() if err != nil { log.Errorf("Error deleting network %s. Err: %v", obj.Key, err) } // delete it from cache collections.networkMutex.Lock() delete(collections.networks, key) collections.networkMutex.Unlock() return nil }
go
func DeleteNetwork(key string) error { collections.networkMutex.Lock() obj := collections.networks[key] collections.networkMutex.Unlock() if obj == nil { log.Errorf("network %s not found", key) return errors.New("network not found") } // Check if we handle this object if objCallbackHandler.NetworkCb == nil { log.Errorf("No callback registered for network object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.NetworkCb.NetworkDelete(obj) if err != nil { log.Errorf("NetworkDelete retruned error for: %+v. Err: %v", obj, err) return err } // delete it from modeldb collections.networkMutex.Lock() err = obj.Delete() collections.networkMutex.Unlock() if err != nil { log.Errorf("Error deleting network %s. Err: %v", obj.Key, err) } // delete it from cache collections.networkMutex.Lock() delete(collections.networks, key) collections.networkMutex.Unlock() return nil }
[ "func", "DeleteNetwork", "(", "key", "string", ")", "error", "{", "collections", ".", "networkMutex", ".", "Lock", "(", ")", "\n", "obj", ":=", "collections", ".", "networks", "[", "key", "]", "\n", "collections", ".", "networkMutex", ".", "Unlock", "(", ...
// Delete a network object
[ "Delete", "a", "network", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L3669-L3705
7,898
contiv/netplugin
contivmodel/contivModel.go
ValidateNetwork
func ValidateNetwork(obj *Network) error { collections.networkMutex.Lock() defer collections.networkMutex.Unlock() // Validate key is correct keyStr := obj.TenantName + ":" + obj.NetworkName if obj.Key != keyStr { log.Errorf("Expecting Network Key: %s. Got: %s", keyStr, obj.Key) return errors.New("Invalid Key") } // Validate each field if len(obj.CfgdTag) > 128 { return errors.New("cfgdTag string too long") } cfgdTagMatch := regexp.MustCompile("^((([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9]))?$") if cfgdTagMatch.MatchString(obj.CfgdTag) == false { return errors.New("cfgdTag string invalid format") } encapMatch := regexp.MustCompile("^(vlan|vxlan)$") if encapMatch.MatchString(obj.Encap) == false { return errors.New("encap string invalid format") } gatewayMatch := regexp.MustCompile("^((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])(\\.(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})?$") if gatewayMatch.MatchString(obj.Gateway) == false { return errors.New("gateway string invalid format") } ipv6GatewayMatch := regexp.MustCompile("^(((([0-9]|[a-f]|[A-F]){1,4})((\\:([0-9]|[a-f]|[A-F]){1,4}){7}))|(((([0-9]|[a-f]|[A-F]){1,4}\\:){0,6}|\\:)((\\:([0-9]|[a-f]|[A-F]){1,4}){0,6}|\\:)))?$") if ipv6GatewayMatch.MatchString(obj.Ipv6Gateway) == false { return errors.New("ipv6Gateway string invalid format") } ipv6SubnetMatch := regexp.MustCompile("^((((([0-9]|[a-f]|[A-F]){1,4})((\\:([0-9]|[a-f]|[A-F]){1,4}){7}))|(((([0-9]|[a-f]|[A-F]){1,4}\\:){0,6}|\\:)((\\:([0-9]|[a-f]|[A-F]){1,4}){0,6}|\\:)))/(1[0-2][0-7]|[1-9][0-9]|[1-9]))?$") if ipv6SubnetMatch.MatchString(obj.Ipv6Subnet) == false { return errors.New("ipv6Subnet string invalid format") } if len(obj.NetworkName) > 64 { return errors.New("networkName string too long") } networkNameMatch := regexp.MustCompile("^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$") if networkNameMatch.MatchString(obj.NetworkName) == false { return errors.New("networkName string invalid format") } if obj.NwType == "" { obj.NwType = "data" } nwTypeMatch := regexp.MustCompile("^(infra|data)$") if nwTypeMatch.MatchString(obj.NwType) == false { return errors.New("nwType string invalid format") } if obj.PktTag > 1.6777216e+07 { return errors.New("pktTag Value Out of bound") } subnetMatch := regexp.MustCompile("^((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])(\\.(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})(\\-((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])(\\.(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))?/(3[0-1]|2[0-9]|1[0-9]|[1-9])$") if subnetMatch.MatchString(obj.Subnet) == false { return errors.New("subnet string invalid format") } if len(obj.TenantName) > 64 { return errors.New("tenantName string too long") } tenantNameMatch := regexp.MustCompile("^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$") if tenantNameMatch.MatchString(obj.TenantName) == false { return errors.New("tenantName string invalid format") } return nil }
go
func ValidateNetwork(obj *Network) error { collections.networkMutex.Lock() defer collections.networkMutex.Unlock() // Validate key is correct keyStr := obj.TenantName + ":" + obj.NetworkName if obj.Key != keyStr { log.Errorf("Expecting Network Key: %s. Got: %s", keyStr, obj.Key) return errors.New("Invalid Key") } // Validate each field if len(obj.CfgdTag) > 128 { return errors.New("cfgdTag string too long") } cfgdTagMatch := regexp.MustCompile("^((([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9]))?$") if cfgdTagMatch.MatchString(obj.CfgdTag) == false { return errors.New("cfgdTag string invalid format") } encapMatch := regexp.MustCompile("^(vlan|vxlan)$") if encapMatch.MatchString(obj.Encap) == false { return errors.New("encap string invalid format") } gatewayMatch := regexp.MustCompile("^((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])(\\.(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})?$") if gatewayMatch.MatchString(obj.Gateway) == false { return errors.New("gateway string invalid format") } ipv6GatewayMatch := regexp.MustCompile("^(((([0-9]|[a-f]|[A-F]){1,4})((\\:([0-9]|[a-f]|[A-F]){1,4}){7}))|(((([0-9]|[a-f]|[A-F]){1,4}\\:){0,6}|\\:)((\\:([0-9]|[a-f]|[A-F]){1,4}){0,6}|\\:)))?$") if ipv6GatewayMatch.MatchString(obj.Ipv6Gateway) == false { return errors.New("ipv6Gateway string invalid format") } ipv6SubnetMatch := regexp.MustCompile("^((((([0-9]|[a-f]|[A-F]){1,4})((\\:([0-9]|[a-f]|[A-F]){1,4}){7}))|(((([0-9]|[a-f]|[A-F]){1,4}\\:){0,6}|\\:)((\\:([0-9]|[a-f]|[A-F]){1,4}){0,6}|\\:)))/(1[0-2][0-7]|[1-9][0-9]|[1-9]))?$") if ipv6SubnetMatch.MatchString(obj.Ipv6Subnet) == false { return errors.New("ipv6Subnet string invalid format") } if len(obj.NetworkName) > 64 { return errors.New("networkName string too long") } networkNameMatch := regexp.MustCompile("^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$") if networkNameMatch.MatchString(obj.NetworkName) == false { return errors.New("networkName string invalid format") } if obj.NwType == "" { obj.NwType = "data" } nwTypeMatch := regexp.MustCompile("^(infra|data)$") if nwTypeMatch.MatchString(obj.NwType) == false { return errors.New("nwType string invalid format") } if obj.PktTag > 1.6777216e+07 { return errors.New("pktTag Value Out of bound") } subnetMatch := regexp.MustCompile("^((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])(\\.(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3})(\\-((25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])(\\.(25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9]?[0-9])){3}))?/(3[0-1]|2[0-9]|1[0-9]|[1-9])$") if subnetMatch.MatchString(obj.Subnet) == false { return errors.New("subnet string invalid format") } if len(obj.TenantName) > 64 { return errors.New("tenantName string too long") } tenantNameMatch := regexp.MustCompile("^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\\-]*[a-zA-Z0-9])\\.)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9\\-]*[A-Za-z0-9])$") if tenantNameMatch.MatchString(obj.TenantName) == false { return errors.New("tenantName string invalid format") } return nil }
[ "func", "ValidateNetwork", "(", "obj", "*", "Network", ")", "error", "{", "collections", ".", "networkMutex", ".", "Lock", "(", ")", "\n", "defer", "collections", ".", "networkMutex", ".", "Unlock", "(", ")", "\n\n", "// Validate key is correct", "keyStr", ":=...
// Validate a network object
[ "Validate", "a", "network", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L3768-L3847
7,899
contiv/netplugin
contivmodel/contivModel.go
GetOperPolicy
func GetOperPolicy(obj *PolicyInspect) error { // Check if we handle this object if objCallbackHandler.PolicyCb == nil { log.Errorf("No callback registered for policy object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.PolicyCb.PolicyGetOper(obj) if err != nil { log.Errorf("PolicyDelete retruned error for: %+v. Err: %v", obj, err) return err } return nil }
go
func GetOperPolicy(obj *PolicyInspect) error { // Check if we handle this object if objCallbackHandler.PolicyCb == nil { log.Errorf("No callback registered for policy object") return errors.New("Invalid object type") } // Perform callback err := objCallbackHandler.PolicyCb.PolicyGetOper(obj) if err != nil { log.Errorf("PolicyDelete retruned error for: %+v. Err: %v", obj, err) return err } return nil }
[ "func", "GetOperPolicy", "(", "obj", "*", "PolicyInspect", ")", "error", "{", "// Check if we handle this object", "if", "objCallbackHandler", ".", "PolicyCb", "==", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ")", "\n", "return", "errors", ".", "New", ...
// Get a policyOper object
[ "Get", "a", "policyOper", "object" ]
965773066d2b8ebed3514979949061a03d46fd20
https://github.com/contiv/netplugin/blob/965773066d2b8ebed3514979949061a03d46fd20/contivmodel/contivModel.go#L3875-L3890