_id stringlengths 2 7 | text stringlengths 6 2.61k | title stringclasses 1
value |
|---|---|---|
c6800 | // NewRPCClient indicates an expected call of NewRPCClient
// nolint | |
c6801 | // GetRPCClient mocks base method
// nolint | |
c6802 | // RemoteCall mocks base method
// nolint | |
c6803 | // RemoteCall indicates an expected call of RemoteCall
// nolint | |
c6804 | // DestroyRPCClient mocks base method
// nolint | |
c6805 | // DestroyRPCClient indicates an expected call of DestroyRPCClient
// nolint | |
c6806 | // ContextList mocks base method
// nolint | |
c6807 | // CheckValidity indicates an expected call of CheckValidity
// nolint | |
c6808 | // StartServer mocks base method
// nolint | |
c6809 | // StartServer indicates an expected call of StartServer
// nolint | |
c6810 | // ProcessMessage indicates an expected call of ProcessMessage
// nolint | |
c6811 | // CheckValidity mocks base method
// nolint | |
c6812 | // Map implements the handler.Mapper interface to emit reconciles for corev1.Pods. It effectively
// filters the pods by looking for a matching nodeName and filters them out if host networking is requested,
// but we don't want to enable those. | |
c6813 | // NewPKIIssuer initializes a new signer structure | |
c6814 | // NewPKIVerifier returns a new PKIConfiguration. | |
c6815 | // Verify verifies a token and returns the public key | |
c6816 | // CreateTokenFromCertificate creates and signs a token | |
c6817 | // KeyFromClaims creates the public key structure from the claims | |
c6818 | // NewTCPProxy creates a new instance of proxy reate a new instance of Proxy | |
c6819 | // RunNetworkServer implements enforcer.Enforcer interface | |
c6820 | // UpdateSecrets updates the secrets of the connections. | |
c6821 | // handle handles a connection | |
c6822 | // Initiate the downstream connection | |
c6823 | // RefreshPUs is used to resend an update event to the Upstream Policy Resolver in case of an update is needed. | |
c6824 | // getKubernetesInformation returns the name and namespace from a standard Docker runtime, if the docker container is associated at all with Kubernetes | |
c6825 | // decorateRuntime decorates the docker runtime with puid of the pause container. | |
c6826 | // NewMockStatsClient creates a new mock instance
// nolint | |
c6827 | // SendStats indicates an expected call of SendStats
// nolint | |
c6828 | // processNetUDPPacket processes a network UDP packet and dispatches it to different methods based on the flags.
// This applies only to control packets. | |
c6829 | // ProcessApplicationUDPPacket processes packets arriving from an application and are destined to the network | |
c6830 | // processApplicationUDPSynPacket processes a single Syn Packet | |
c6831 | // sendUDPSynAckPacket processes a UDP SynAck packet | |
c6832 | // processNetworkUDPSynPacket processes a syn packet arriving from the network | |
c6833 | // sendUDPFinPacket sends a Fin packet to Peer. | |
c6834 | // Update the udp fin cache and delete the connmark. | |
c6835 | // newRemoteEnforcer starts a new server | |
c6836 | // Enforce this method calls the enforce method on the enforcer created during initenforcer | |
c6837 | // Unenforce this method calls the unenforce method on the enforcer created from initenforcer | |
c6838 | // SetTargetNetworks calls the same method on the actual enforcer | |
c6839 | // EnforcerExit is processing messages from the remote that are requesting an exit. In this
// case we simply cancel the context. | |
c6840 | // UpdateSecrets updates the secrets used by the remote enforcer | |
c6841 | // EnableIPTablesPacketTracing enables iptables trace packet tracing | |
c6842 | // setup an enforcer | |
c6843 | // cleanup cleans all the acls and any state of the local enforcer. | |
c6844 | // LaunchRemoteEnforcer launches a remote enforcer | |
c6845 | // getCEnvVariable returns an environment variable set in the c context | |
c6846 | // NewAPICache creates a new API cache | |
c6847 | // FindRule finds a rule in the APICache without validating scopes | |
c6848 | // FindAndMatchScope finds the rule and returns true only if the scope matches
// as well. It also returns true of this was a public rule, allowing the callers
// to decide how to present the data or potentially what to do if authorization
// fails. | |
c6849 | // MatchClaims receives a set of claim matchibg rules and a set of claims
// and returns true of the claims match the rules. | |
c6850 | // Find finds a URI in the cache and returns true and the data if found.
// If not found it returns false. | |
c6851 | // parse parses a URI and splits into prefix, suffix | |
c6852 | // insert adds an api to the api cache | |
c6853 | // getPausePUID returns puid of pause container. | |
c6854 | // PolicyExtensions retrieves policy extensions | |
c6855 | // IsHostNetworkContainer returns true if container has hostnetwork set
// to true or is linked to container with hostnetwork set to true. | |
c6856 | // IsKubernetesContainer checks if the container is in K8s. | |
c6857 | // KubePodIdentifier returns identifier for K8s pod. | |
c6858 | //NewPolicyDB creates a new PolicyDB for efficient search of policies | |
c6859 | // Custom implementation for splitting strings. Gives significant performance
// improvement. Do not allocate new strings | |
c6860 | // Search searches for a set of tags in the database to find a policy match | |
c6861 | // PrintPolicyDB is a debugging function to dump the map | |
c6862 | // cgroupChainRules provides the rules for redirecting to a processing unit
// specific chain based for Linux processed and based on the cgroups and net_cls
// configuration. | |
c6863 | // containerChainRules provides the list of rules that are used to send traffic to
// a particular chain | |
c6864 | // proxyRules creates the rules that allow traffic to go through if it is handled
// by the services. | |
c6865 | // trapRules provides the packet capture rules that are defined for each processing unit. | |
c6866 | // addContainerChain adds a chain for the specific container and redirects traffic there
// This simplifies significantly the management and makes the iptable rules more readable
// All rules related to a container are contained within the dedicated chain | |
c6867 | // processRulesFromList is a generic helper that parses a set of rules and sends the corresponding
// ACL commands. | |
c6868 | // addPacketTrap adds the necessary iptables rules to capture control packets to user space | |
c6869 | // programExtensionsRules programs iptable rules for the given extensions | |
c6870 | // sortACLsInBuckets will process all the rules and add them in a list of buckets
// based on their priority. We need an explicit order of these buckets
// in order to support observation only of ACL actions. The parameters
// must provide the chain and whether it is App or Net ACLs so that the rules
// can be created ... | |
c6871 | // addExternalACLs adds a set of rules to the external services that are initiated
// by an application. The allow rules are inserted with highest priority. | |
c6872 | // deleteChainRules deletes the rules that send traffic to our chain | |
c6873 | // deletePUChains removes all the container specific chains and basic rules | |
c6874 | // setGlobalRules installs the global rules | |
c6875 | // cleanACLSection flushes and deletes all chains with Prefix - Trireme | |
c6876 | // NewMockRuntimeReader creates a new mock instance
// nolint | |
c6877 | // Pid mocks base method
// nolint | |
c6878 | // Tag mocks base method
// nolint | |
c6879 | // Tag indicates an expected call of Tag
// nolint | |
c6880 | // Tags mocks base method
// nolint | |
c6881 | // Options mocks base method
// nolint | |
c6882 | // IPAddresses mocks base method
// nolint | |
c6883 | // PUType mocks base method
// nolint | |
c6884 | // PUType indicates an expected call of PUType
// nolint | |
c6885 | // SetServices mocks base method
// nolint | |
c6886 | // SetServices indicates an expected call of SetServices
// nolint | |
c6887 | // PortMap mocks base method
// nolint | |
c6888 | // NewMockResolver creates a new mock instance
// nolint | |
c6889 | // HandlePUEvent mocks base method
// nolint | |
c6890 | // HandlePUEvent indicates an expected call of HandlePUEvent
// nolint | |
c6891 | // Code returns collector reason | |
c6892 | // CodeFromErr returns the collector code from ErrToken | |
c6893 | // Run runs the Nf Logger | |
c6894 | // newAppConnectionState will create the initial connection state object. | |
c6895 | // newNetworkConnectionState will create the initial connection state object. | |
c6896 | // KubernetesMetadataExtractor is a systemd based metadata extractor | |
c6897 | // CleanAllTriremeACLs cleans up all previous Trireme ACLs. It can be called from
// other packages for housekeeping. | |
c6898 | // ActionString returns if the action if accepted of rejected as a long string. | |
c6899 | // LogPrefix is the prefix used in nf-log action. It must be less than |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.