_id
stringlengths
2
7
text
stringlengths
6
2.61k
title
stringclasses
1 value
c6800
// NewRPCClient indicates an expected call of NewRPCClient // nolint
c6801
// GetRPCClient mocks base method // nolint
c6802
// RemoteCall mocks base method // nolint
c6803
// RemoteCall indicates an expected call of RemoteCall // nolint
c6804
// DestroyRPCClient mocks base method // nolint
c6805
// DestroyRPCClient indicates an expected call of DestroyRPCClient // nolint
c6806
// ContextList mocks base method // nolint
c6807
// CheckValidity indicates an expected call of CheckValidity // nolint
c6808
// StartServer mocks base method // nolint
c6809
// StartServer indicates an expected call of StartServer // nolint
c6810
// ProcessMessage indicates an expected call of ProcessMessage // nolint
c6811
// CheckValidity mocks base method // nolint
c6812
// Map implements the handler.Mapper interface to emit reconciles for corev1.Pods. It effectively // filters the pods by looking for a matching nodeName and filters them out if host networking is requested, // but we don't want to enable those.
c6813
// NewPKIIssuer initializes a new signer structure
c6814
// NewPKIVerifier returns a new PKIConfiguration.
c6815
// Verify verifies a token and returns the public key
c6816
// CreateTokenFromCertificate creates and signs a token
c6817
// KeyFromClaims creates the public key structure from the claims
c6818
// NewTCPProxy creates a new instance of proxy reate a new instance of Proxy
c6819
// RunNetworkServer implements enforcer.Enforcer interface
c6820
// UpdateSecrets updates the secrets of the connections.
c6821
// handle handles a connection
c6822
// Initiate the downstream connection
c6823
// RefreshPUs is used to resend an update event to the Upstream Policy Resolver in case of an update is needed.
c6824
// getKubernetesInformation returns the name and namespace from a standard Docker runtime, if the docker container is associated at all with Kubernetes
c6825
// decorateRuntime decorates the docker runtime with puid of the pause container.
c6826
// NewMockStatsClient creates a new mock instance // nolint
c6827
// SendStats indicates an expected call of SendStats // nolint
c6828
// processNetUDPPacket processes a network UDP packet and dispatches it to different methods based on the flags. // This applies only to control packets.
c6829
// ProcessApplicationUDPPacket processes packets arriving from an application and are destined to the network
c6830
// processApplicationUDPSynPacket processes a single Syn Packet
c6831
// sendUDPSynAckPacket processes a UDP SynAck packet
c6832
// processNetworkUDPSynPacket processes a syn packet arriving from the network
c6833
// sendUDPFinPacket sends a Fin packet to Peer.
c6834
// Update the udp fin cache and delete the connmark.
c6835
// newRemoteEnforcer starts a new server
c6836
// Enforce this method calls the enforce method on the enforcer created during initenforcer
c6837
// Unenforce this method calls the unenforce method on the enforcer created from initenforcer
c6838
// SetTargetNetworks calls the same method on the actual enforcer
c6839
// EnforcerExit is processing messages from the remote that are requesting an exit. In this // case we simply cancel the context.
c6840
// UpdateSecrets updates the secrets used by the remote enforcer
c6841
// EnableIPTablesPacketTracing enables iptables trace packet tracing
c6842
// setup an enforcer
c6843
// cleanup cleans all the acls and any state of the local enforcer.
c6844
// LaunchRemoteEnforcer launches a remote enforcer
c6845
// getCEnvVariable returns an environment variable set in the c context
c6846
// NewAPICache creates a new API cache
c6847
// FindRule finds a rule in the APICache without validating scopes
c6848
// FindAndMatchScope finds the rule and returns true only if the scope matches // as well. It also returns true of this was a public rule, allowing the callers // to decide how to present the data or potentially what to do if authorization // fails.
c6849
// MatchClaims receives a set of claim matchibg rules and a set of claims // and returns true of the claims match the rules.
c6850
// Find finds a URI in the cache and returns true and the data if found. // If not found it returns false.
c6851
// parse parses a URI and splits into prefix, suffix
c6852
// insert adds an api to the api cache
c6853
// getPausePUID returns puid of pause container.
c6854
// PolicyExtensions retrieves policy extensions
c6855
// IsHostNetworkContainer returns true if container has hostnetwork set // to true or is linked to container with hostnetwork set to true.
c6856
// IsKubernetesContainer checks if the container is in K8s.
c6857
// KubePodIdentifier returns identifier for K8s pod.
c6858
//NewPolicyDB creates a new PolicyDB for efficient search of policies
c6859
// Custom implementation for splitting strings. Gives significant performance // improvement. Do not allocate new strings
c6860
// Search searches for a set of tags in the database to find a policy match
c6861
// PrintPolicyDB is a debugging function to dump the map
c6862
// cgroupChainRules provides the rules for redirecting to a processing unit // specific chain based for Linux processed and based on the cgroups and net_cls // configuration.
c6863
// containerChainRules provides the list of rules that are used to send traffic to // a particular chain
c6864
// proxyRules creates the rules that allow traffic to go through if it is handled // by the services.
c6865
// trapRules provides the packet capture rules that are defined for each processing unit.
c6866
// addContainerChain adds a chain for the specific container and redirects traffic there // This simplifies significantly the management and makes the iptable rules more readable // All rules related to a container are contained within the dedicated chain
c6867
// processRulesFromList is a generic helper that parses a set of rules and sends the corresponding // ACL commands.
c6868
// addPacketTrap adds the necessary iptables rules to capture control packets to user space
c6869
// programExtensionsRules programs iptable rules for the given extensions
c6870
// sortACLsInBuckets will process all the rules and add them in a list of buckets // based on their priority. We need an explicit order of these buckets // in order to support observation only of ACL actions. The parameters // must provide the chain and whether it is App or Net ACLs so that the rules // can be created ...
c6871
// addExternalACLs adds a set of rules to the external services that are initiated // by an application. The allow rules are inserted with highest priority.
c6872
// deleteChainRules deletes the rules that send traffic to our chain
c6873
// deletePUChains removes all the container specific chains and basic rules
c6874
// setGlobalRules installs the global rules
c6875
// cleanACLSection flushes and deletes all chains with Prefix - Trireme
c6876
// NewMockRuntimeReader creates a new mock instance // nolint
c6877
// Pid mocks base method // nolint
c6878
// Tag mocks base method // nolint
c6879
// Tag indicates an expected call of Tag // nolint
c6880
// Tags mocks base method // nolint
c6881
// Options mocks base method // nolint
c6882
// IPAddresses mocks base method // nolint
c6883
// PUType mocks base method // nolint
c6884
// PUType indicates an expected call of PUType // nolint
c6885
// SetServices mocks base method // nolint
c6886
// SetServices indicates an expected call of SetServices // nolint
c6887
// PortMap mocks base method // nolint
c6888
// NewMockResolver creates a new mock instance // nolint
c6889
// HandlePUEvent mocks base method // nolint
c6890
// HandlePUEvent indicates an expected call of HandlePUEvent // nolint
c6891
// Code returns collector reason
c6892
// CodeFromErr returns the collector code from ErrToken
c6893
// Run runs the Nf Logger
c6894
// newAppConnectionState will create the initial connection state object.
c6895
// newNetworkConnectionState will create the initial connection state object.
c6896
// KubernetesMetadataExtractor is a systemd based metadata extractor
c6897
// CleanAllTriremeACLs cleans up all previous Trireme ACLs. It can be called from // other packages for housekeeping.
c6898
// ActionString returns if the action if accepted of rejected as a long string.
c6899
// LogPrefix is the prefix used in nf-log action. It must be less than