repo
stringlengths 5
54
| path
stringlengths 4
155
| func_name
stringlengths 1
118
| original_string
stringlengths 52
85.5k
| language
stringclasses 1
value | code
stringlengths 52
85.5k
| code_tokens
list | docstring
stringlengths 6
2.61k
| docstring_tokens
list | sha
stringlengths 40
40
| url
stringlengths 85
252
| partition
stringclasses 1
value |
---|---|---|---|---|---|---|---|---|---|---|---|
docker/libnetwork
|
controller.go
|
SandboxContainerWalker
|
func SandboxContainerWalker(out *Sandbox, containerID string) SandboxWalker {
return func(sb Sandbox) bool {
if sb.ContainerID() == containerID {
*out = sb
return true
}
return false
}
}
|
go
|
func SandboxContainerWalker(out *Sandbox, containerID string) SandboxWalker {
return func(sb Sandbox) bool {
if sb.ContainerID() == containerID {
*out = sb
return true
}
return false
}
}
|
[
"func",
"SandboxContainerWalker",
"(",
"out",
"*",
"Sandbox",
",",
"containerID",
"string",
")",
"SandboxWalker",
"{",
"return",
"func",
"(",
"sb",
"Sandbox",
")",
"bool",
"{",
"if",
"sb",
".",
"ContainerID",
"(",
")",
"==",
"containerID",
"{",
"*",
"out",
"=",
"sb",
"\n",
"return",
"true",
"\n",
"}",
"\n",
"return",
"false",
"\n",
"}",
"\n",
"}"
] |
// SandboxContainerWalker returns a Sandbox Walker function which looks for an existing Sandbox with the passed containerID
|
[
"SandboxContainerWalker",
"returns",
"a",
"Sandbox",
"Walker",
"function",
"which",
"looks",
"for",
"an",
"existing",
"Sandbox",
"with",
"the",
"passed",
"containerID"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/controller.go#L1251-L1259
|
train
|
docker/libnetwork
|
controller.go
|
SandboxKeyWalker
|
func SandboxKeyWalker(out *Sandbox, key string) SandboxWalker {
return func(sb Sandbox) bool {
if sb.Key() == key {
*out = sb
return true
}
return false
}
}
|
go
|
func SandboxKeyWalker(out *Sandbox, key string) SandboxWalker {
return func(sb Sandbox) bool {
if sb.Key() == key {
*out = sb
return true
}
return false
}
}
|
[
"func",
"SandboxKeyWalker",
"(",
"out",
"*",
"Sandbox",
",",
"key",
"string",
")",
"SandboxWalker",
"{",
"return",
"func",
"(",
"sb",
"Sandbox",
")",
"bool",
"{",
"if",
"sb",
".",
"Key",
"(",
")",
"==",
"key",
"{",
"*",
"out",
"=",
"sb",
"\n",
"return",
"true",
"\n",
"}",
"\n",
"return",
"false",
"\n",
"}",
"\n",
"}"
] |
// SandboxKeyWalker returns a Sandbox Walker function which looks for an existing Sandbox with the passed key
|
[
"SandboxKeyWalker",
"returns",
"a",
"Sandbox",
"Walker",
"function",
"which",
"looks",
"for",
"an",
"existing",
"Sandbox",
"with",
"the",
"passed",
"key"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/controller.go#L1262-L1270
|
train
|
docker/libnetwork
|
controller.go
|
StartDiagnostic
|
func (c *controller) StartDiagnostic(port int) {
c.Lock()
if !c.DiagnosticServer.IsDiagnosticEnabled() {
c.DiagnosticServer.EnableDiagnostic("127.0.0.1", port)
}
c.Unlock()
}
|
go
|
func (c *controller) StartDiagnostic(port int) {
c.Lock()
if !c.DiagnosticServer.IsDiagnosticEnabled() {
c.DiagnosticServer.EnableDiagnostic("127.0.0.1", port)
}
c.Unlock()
}
|
[
"func",
"(",
"c",
"*",
"controller",
")",
"StartDiagnostic",
"(",
"port",
"int",
")",
"{",
"c",
".",
"Lock",
"(",
")",
"\n",
"if",
"!",
"c",
".",
"DiagnosticServer",
".",
"IsDiagnosticEnabled",
"(",
")",
"{",
"c",
".",
"DiagnosticServer",
".",
"EnableDiagnostic",
"(",
"\"127.0.0.1\"",
",",
"port",
")",
"\n",
"}",
"\n",
"c",
".",
"Unlock",
"(",
")",
"\n",
"}"
] |
// StartDiagnostic start the network dias mode
|
[
"StartDiagnostic",
"start",
"the",
"network",
"dias",
"mode"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/controller.go#L1335-L1341
|
train
|
docker/libnetwork
|
controller.go
|
StopDiagnostic
|
func (c *controller) StopDiagnostic() {
c.Lock()
if c.DiagnosticServer.IsDiagnosticEnabled() {
c.DiagnosticServer.DisableDiagnostic()
}
c.Unlock()
}
|
go
|
func (c *controller) StopDiagnostic() {
c.Lock()
if c.DiagnosticServer.IsDiagnosticEnabled() {
c.DiagnosticServer.DisableDiagnostic()
}
c.Unlock()
}
|
[
"func",
"(",
"c",
"*",
"controller",
")",
"StopDiagnostic",
"(",
")",
"{",
"c",
".",
"Lock",
"(",
")",
"\n",
"if",
"c",
".",
"DiagnosticServer",
".",
"IsDiagnosticEnabled",
"(",
")",
"{",
"c",
".",
"DiagnosticServer",
".",
"DisableDiagnostic",
"(",
")",
"\n",
"}",
"\n",
"c",
".",
"Unlock",
"(",
")",
"\n",
"}"
] |
// StopDiagnostic start the network dias mode
|
[
"StopDiagnostic",
"start",
"the",
"network",
"dias",
"mode"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/controller.go#L1344-L1350
|
train
|
docker/libnetwork
|
controller.go
|
IsDiagnosticEnabled
|
func (c *controller) IsDiagnosticEnabled() bool {
c.Lock()
defer c.Unlock()
return c.DiagnosticServer.IsDiagnosticEnabled()
}
|
go
|
func (c *controller) IsDiagnosticEnabled() bool {
c.Lock()
defer c.Unlock()
return c.DiagnosticServer.IsDiagnosticEnabled()
}
|
[
"func",
"(",
"c",
"*",
"controller",
")",
"IsDiagnosticEnabled",
"(",
")",
"bool",
"{",
"c",
".",
"Lock",
"(",
")",
"\n",
"defer",
"c",
".",
"Unlock",
"(",
")",
"\n",
"return",
"c",
".",
"DiagnosticServer",
".",
"IsDiagnosticEnabled",
"(",
")",
"\n",
"}"
] |
// IsDiagnosticEnabled returns true if the dias is enabled
|
[
"IsDiagnosticEnabled",
"returns",
"true",
"if",
"the",
"dias",
"is",
"enabled"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/controller.go#L1353-L1357
|
train
|
docker/libnetwork
|
drivers/overlay/ov_network.go
|
destroySandbox
|
func (n *network) destroySandbox() {
if n.sbox != nil {
for _, iface := range n.sbox.Info().Interfaces() {
if err := iface.Remove(); err != nil {
logrus.Debugf("Remove interface %s failed: %v", iface.SrcName(), err)
}
}
for _, s := range n.subnets {
if hostMode {
if err := removeFilters(n.id[:12], s.brName); err != nil {
logrus.Warnf("Could not remove overlay filters: %v", err)
}
}
if s.vxlanName != "" {
err := deleteInterface(s.vxlanName)
if err != nil {
logrus.Warnf("could not cleanup sandbox properly: %v", err)
}
}
}
if hostMode {
if err := removeNetworkChain(n.id[:12]); err != nil {
logrus.Warnf("could not remove network chain: %v", err)
}
}
// Close the netlink socket, this will also release the watchMiss goroutine that is using it
if n.nlSocket != nil {
n.nlSocket.Close()
n.nlSocket = nil
}
n.sbox.Destroy()
n.sbox = nil
}
}
|
go
|
func (n *network) destroySandbox() {
if n.sbox != nil {
for _, iface := range n.sbox.Info().Interfaces() {
if err := iface.Remove(); err != nil {
logrus.Debugf("Remove interface %s failed: %v", iface.SrcName(), err)
}
}
for _, s := range n.subnets {
if hostMode {
if err := removeFilters(n.id[:12], s.brName); err != nil {
logrus.Warnf("Could not remove overlay filters: %v", err)
}
}
if s.vxlanName != "" {
err := deleteInterface(s.vxlanName)
if err != nil {
logrus.Warnf("could not cleanup sandbox properly: %v", err)
}
}
}
if hostMode {
if err := removeNetworkChain(n.id[:12]); err != nil {
logrus.Warnf("could not remove network chain: %v", err)
}
}
// Close the netlink socket, this will also release the watchMiss goroutine that is using it
if n.nlSocket != nil {
n.nlSocket.Close()
n.nlSocket = nil
}
n.sbox.Destroy()
n.sbox = nil
}
}
|
[
"func",
"(",
"n",
"*",
"network",
")",
"destroySandbox",
"(",
")",
"{",
"if",
"n",
".",
"sbox",
"!=",
"nil",
"{",
"for",
"_",
",",
"iface",
":=",
"range",
"n",
".",
"sbox",
".",
"Info",
"(",
")",
".",
"Interfaces",
"(",
")",
"{",
"if",
"err",
":=",
"iface",
".",
"Remove",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Debugf",
"(",
"\"Remove interface %s failed: %v\"",
",",
"iface",
".",
"SrcName",
"(",
")",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"for",
"_",
",",
"s",
":=",
"range",
"n",
".",
"subnets",
"{",
"if",
"hostMode",
"{",
"if",
"err",
":=",
"removeFilters",
"(",
"n",
".",
"id",
"[",
":",
"12",
"]",
",",
"s",
".",
"brName",
")",
";",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Warnf",
"(",
"\"Could not remove overlay filters: %v\"",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"s",
".",
"vxlanName",
"!=",
"\"\"",
"{",
"err",
":=",
"deleteInterface",
"(",
"s",
".",
"vxlanName",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Warnf",
"(",
"\"could not cleanup sandbox properly: %v\"",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"hostMode",
"{",
"if",
"err",
":=",
"removeNetworkChain",
"(",
"n",
".",
"id",
"[",
":",
"12",
"]",
")",
";",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Warnf",
"(",
"\"could not remove network chain: %v\"",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"n",
".",
"nlSocket",
"!=",
"nil",
"{",
"n",
".",
"nlSocket",
".",
"Close",
"(",
")",
"\n",
"n",
".",
"nlSocket",
"=",
"nil",
"\n",
"}",
"\n",
"n",
".",
"sbox",
".",
"Destroy",
"(",
")",
"\n",
"n",
".",
"sbox",
"=",
"nil",
"\n",
"}",
"\n",
"}"
] |
// to be called while holding network lock
|
[
"to",
"be",
"called",
"while",
"holding",
"network",
"lock"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/overlay/ov_network.go#L374-L412
|
train
|
docker/libnetwork
|
drivers/overlay/ov_network.go
|
initSubnetSandbox
|
func (n *network) initSubnetSandbox(s *subnet, restore bool) error {
brName := n.generateBridgeName(s)
vxlanName := n.generateVxlanName(s)
if restore {
if err := n.restoreSubnetSandbox(s, brName, vxlanName); err != nil {
return err
}
} else {
if err := n.setupSubnetSandbox(s, brName, vxlanName); err != nil {
return err
}
}
s.vxlanName = vxlanName
s.brName = brName
return nil
}
|
go
|
func (n *network) initSubnetSandbox(s *subnet, restore bool) error {
brName := n.generateBridgeName(s)
vxlanName := n.generateVxlanName(s)
if restore {
if err := n.restoreSubnetSandbox(s, brName, vxlanName); err != nil {
return err
}
} else {
if err := n.setupSubnetSandbox(s, brName, vxlanName); err != nil {
return err
}
}
s.vxlanName = vxlanName
s.brName = brName
return nil
}
|
[
"func",
"(",
"n",
"*",
"network",
")",
"initSubnetSandbox",
"(",
"s",
"*",
"subnet",
",",
"restore",
"bool",
")",
"error",
"{",
"brName",
":=",
"n",
".",
"generateBridgeName",
"(",
"s",
")",
"\n",
"vxlanName",
":=",
"n",
".",
"generateVxlanName",
"(",
"s",
")",
"\n",
"if",
"restore",
"{",
"if",
"err",
":=",
"n",
".",
"restoreSubnetSandbox",
"(",
"s",
",",
"brName",
",",
"vxlanName",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"else",
"{",
"if",
"err",
":=",
"n",
".",
"setupSubnetSandbox",
"(",
"s",
",",
"brName",
",",
"vxlanName",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"s",
".",
"vxlanName",
"=",
"vxlanName",
"\n",
"s",
".",
"brName",
"=",
"brName",
"\n",
"return",
"nil",
"\n",
"}"
] |
// Must be called with the network lock
|
[
"Must",
"be",
"called",
"with",
"the",
"network",
"lock"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/overlay/ov_network.go#L662-L680
|
train
|
docker/libnetwork
|
drivers/overlay/ov_network.go
|
restoreNetworkFromStore
|
func (d *driver) restoreNetworkFromStore(nid string) *network {
n := d.getNetworkFromStore(nid)
if n != nil {
n.driver = d
n.endpoints = endpointTable{}
d.networks[nid] = n
}
return n
}
|
go
|
func (d *driver) restoreNetworkFromStore(nid string) *network {
n := d.getNetworkFromStore(nid)
if n != nil {
n.driver = d
n.endpoints = endpointTable{}
d.networks[nid] = n
}
return n
}
|
[
"func",
"(",
"d",
"*",
"driver",
")",
"restoreNetworkFromStore",
"(",
"nid",
"string",
")",
"*",
"network",
"{",
"n",
":=",
"d",
".",
"getNetworkFromStore",
"(",
"nid",
")",
"\n",
"if",
"n",
"!=",
"nil",
"{",
"n",
".",
"driver",
"=",
"d",
"\n",
"n",
".",
"endpoints",
"=",
"endpointTable",
"{",
"}",
"\n",
"d",
".",
"networks",
"[",
"nid",
"]",
"=",
"n",
"\n",
"}",
"\n",
"return",
"n",
"\n",
"}"
] |
// Restore a network from the store to the driver if it is present.
// Must be called with the driver locked!
|
[
"Restore",
"a",
"network",
"from",
"the",
"store",
"to",
"the",
"driver",
"if",
"it",
"is",
"present",
".",
"Must",
"be",
"called",
"with",
"the",
"driver",
"locked!"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/overlay/ov_network.go#L863-L871
|
train
|
docker/libnetwork
|
drivers/ipvlan/ipvlan_network.go
|
createNetwork
|
func (d *driver) createNetwork(config *configuration) error {
networkList := d.getNetworks()
for _, nw := range networkList {
if config.Parent == nw.config.Parent {
return fmt.Errorf("network %s is already using parent interface %s",
getDummyName(stringid.TruncateID(nw.config.ID)), config.Parent)
}
}
if !parentExists(config.Parent) {
// if the --internal flag is set, create a dummy link
if config.Internal {
err := createDummyLink(config.Parent, getDummyName(stringid.TruncateID(config.ID)))
if err != nil {
return err
}
config.CreatedSlaveLink = true
// notify the user in logs they have limited communications
if config.Parent == getDummyName(stringid.TruncateID(config.ID)) {
logrus.Debugf("Empty -o parent= and --internal flags limit communications to other containers inside of network: %s",
config.Parent)
}
} else {
// if the subinterface parent_iface.vlan_id checks do not pass, return err.
// a valid example is 'eth0.10' for a parent iface 'eth0' with a vlan id '10'
err := createVlanLink(config.Parent)
if err != nil {
return err
}
// if driver created the networks slave link, record it for future deletion
config.CreatedSlaveLink = true
}
}
n := &network{
id: config.ID,
driver: d,
endpoints: endpointTable{},
config: config,
}
// add the *network
d.addNetwork(n)
return nil
}
|
go
|
func (d *driver) createNetwork(config *configuration) error {
networkList := d.getNetworks()
for _, nw := range networkList {
if config.Parent == nw.config.Parent {
return fmt.Errorf("network %s is already using parent interface %s",
getDummyName(stringid.TruncateID(nw.config.ID)), config.Parent)
}
}
if !parentExists(config.Parent) {
// if the --internal flag is set, create a dummy link
if config.Internal {
err := createDummyLink(config.Parent, getDummyName(stringid.TruncateID(config.ID)))
if err != nil {
return err
}
config.CreatedSlaveLink = true
// notify the user in logs they have limited communications
if config.Parent == getDummyName(stringid.TruncateID(config.ID)) {
logrus.Debugf("Empty -o parent= and --internal flags limit communications to other containers inside of network: %s",
config.Parent)
}
} else {
// if the subinterface parent_iface.vlan_id checks do not pass, return err.
// a valid example is 'eth0.10' for a parent iface 'eth0' with a vlan id '10'
err := createVlanLink(config.Parent)
if err != nil {
return err
}
// if driver created the networks slave link, record it for future deletion
config.CreatedSlaveLink = true
}
}
n := &network{
id: config.ID,
driver: d,
endpoints: endpointTable{},
config: config,
}
// add the *network
d.addNetwork(n)
return nil
}
|
[
"func",
"(",
"d",
"*",
"driver",
")",
"createNetwork",
"(",
"config",
"*",
"configuration",
")",
"error",
"{",
"networkList",
":=",
"d",
".",
"getNetworks",
"(",
")",
"\n",
"for",
"_",
",",
"nw",
":=",
"range",
"networkList",
"{",
"if",
"config",
".",
"Parent",
"==",
"nw",
".",
"config",
".",
"Parent",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"network %s is already using parent interface %s\"",
",",
"getDummyName",
"(",
"stringid",
".",
"TruncateID",
"(",
"nw",
".",
"config",
".",
"ID",
")",
")",
",",
"config",
".",
"Parent",
")",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"!",
"parentExists",
"(",
"config",
".",
"Parent",
")",
"{",
"if",
"config",
".",
"Internal",
"{",
"err",
":=",
"createDummyLink",
"(",
"config",
".",
"Parent",
",",
"getDummyName",
"(",
"stringid",
".",
"TruncateID",
"(",
"config",
".",
"ID",
")",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"config",
".",
"CreatedSlaveLink",
"=",
"true",
"\n",
"if",
"config",
".",
"Parent",
"==",
"getDummyName",
"(",
"stringid",
".",
"TruncateID",
"(",
"config",
".",
"ID",
")",
")",
"{",
"logrus",
".",
"Debugf",
"(",
"\"Empty -o parent= and --internal flags limit communications to other containers inside of network: %s\"",
",",
"config",
".",
"Parent",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"err",
":=",
"createVlanLink",
"(",
"config",
".",
"Parent",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"config",
".",
"CreatedSlaveLink",
"=",
"true",
"\n",
"}",
"\n",
"}",
"\n",
"n",
":=",
"&",
"network",
"{",
"id",
":",
"config",
".",
"ID",
",",
"driver",
":",
"d",
",",
"endpoints",
":",
"endpointTable",
"{",
"}",
",",
"config",
":",
"config",
",",
"}",
"\n",
"d",
".",
"addNetwork",
"(",
"n",
")",
"\n",
"return",
"nil",
"\n",
"}"
] |
// createNetwork is used by new network callbacks and persistent network cache
|
[
"createNetwork",
"is",
"used",
"by",
"new",
"network",
"callbacks",
"and",
"persistent",
"network",
"cache"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/ipvlan/ipvlan_network.go#L79-L121
|
train
|
docker/libnetwork
|
drivers/ipvlan/ipvlan_network.go
|
DeleteNetwork
|
func (d *driver) DeleteNetwork(nid string) error {
defer osl.InitOSContext()()
n := d.network(nid)
if n == nil {
return fmt.Errorf("network id %s not found", nid)
}
// if the driver created the slave interface, delete it, otherwise leave it
if ok := n.config.CreatedSlaveLink; ok {
// if the interface exists, only delete if it matches iface.vlan or dummy.net_id naming
if ok := parentExists(n.config.Parent); ok {
// only delete the link if it is named the net_id
if n.config.Parent == getDummyName(stringid.TruncateID(nid)) {
err := delDummyLink(n.config.Parent)
if err != nil {
logrus.Debugf("link %s was not deleted, continuing the delete network operation: %v",
n.config.Parent, err)
}
} else {
// only delete the link if it matches iface.vlan naming
err := delVlanLink(n.config.Parent)
if err != nil {
logrus.Debugf("link %s was not deleted, continuing the delete network operation: %v",
n.config.Parent, err)
}
}
}
}
for _, ep := range n.endpoints {
if link, err := ns.NlHandle().LinkByName(ep.srcName); err == nil {
if err := ns.NlHandle().LinkDel(link); err != nil {
logrus.WithError(err).Warnf("Failed to delete interface (%s)'s link on endpoint (%s) delete", ep.srcName, ep.id)
}
}
if err := d.storeDelete(ep); err != nil {
logrus.Warnf("Failed to remove ipvlan endpoint %.7s from store: %v", ep.id, err)
}
}
// delete the *network
d.deleteNetwork(nid)
// delete the network record from persistent cache
err := d.storeDelete(n.config)
if err != nil {
return fmt.Errorf("error deleting deleting id %s from datastore: %v", nid, err)
}
return nil
}
|
go
|
func (d *driver) DeleteNetwork(nid string) error {
defer osl.InitOSContext()()
n := d.network(nid)
if n == nil {
return fmt.Errorf("network id %s not found", nid)
}
// if the driver created the slave interface, delete it, otherwise leave it
if ok := n.config.CreatedSlaveLink; ok {
// if the interface exists, only delete if it matches iface.vlan or dummy.net_id naming
if ok := parentExists(n.config.Parent); ok {
// only delete the link if it is named the net_id
if n.config.Parent == getDummyName(stringid.TruncateID(nid)) {
err := delDummyLink(n.config.Parent)
if err != nil {
logrus.Debugf("link %s was not deleted, continuing the delete network operation: %v",
n.config.Parent, err)
}
} else {
// only delete the link if it matches iface.vlan naming
err := delVlanLink(n.config.Parent)
if err != nil {
logrus.Debugf("link %s was not deleted, continuing the delete network operation: %v",
n.config.Parent, err)
}
}
}
}
for _, ep := range n.endpoints {
if link, err := ns.NlHandle().LinkByName(ep.srcName); err == nil {
if err := ns.NlHandle().LinkDel(link); err != nil {
logrus.WithError(err).Warnf("Failed to delete interface (%s)'s link on endpoint (%s) delete", ep.srcName, ep.id)
}
}
if err := d.storeDelete(ep); err != nil {
logrus.Warnf("Failed to remove ipvlan endpoint %.7s from store: %v", ep.id, err)
}
}
// delete the *network
d.deleteNetwork(nid)
// delete the network record from persistent cache
err := d.storeDelete(n.config)
if err != nil {
return fmt.Errorf("error deleting deleting id %s from datastore: %v", nid, err)
}
return nil
}
|
[
"func",
"(",
"d",
"*",
"driver",
")",
"DeleteNetwork",
"(",
"nid",
"string",
")",
"error",
"{",
"defer",
"osl",
".",
"InitOSContext",
"(",
")",
"(",
")",
"\n",
"n",
":=",
"d",
".",
"network",
"(",
"nid",
")",
"\n",
"if",
"n",
"==",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"network id %s not found\"",
",",
"nid",
")",
"\n",
"}",
"\n",
"if",
"ok",
":=",
"n",
".",
"config",
".",
"CreatedSlaveLink",
";",
"ok",
"{",
"if",
"ok",
":=",
"parentExists",
"(",
"n",
".",
"config",
".",
"Parent",
")",
";",
"ok",
"{",
"if",
"n",
".",
"config",
".",
"Parent",
"==",
"getDummyName",
"(",
"stringid",
".",
"TruncateID",
"(",
"nid",
")",
")",
"{",
"err",
":=",
"delDummyLink",
"(",
"n",
".",
"config",
".",
"Parent",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Debugf",
"(",
"\"link %s was not deleted, continuing the delete network operation: %v\"",
",",
"n",
".",
"config",
".",
"Parent",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"err",
":=",
"delVlanLink",
"(",
"n",
".",
"config",
".",
"Parent",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Debugf",
"(",
"\"link %s was not deleted, continuing the delete network operation: %v\"",
",",
"n",
".",
"config",
".",
"Parent",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"for",
"_",
",",
"ep",
":=",
"range",
"n",
".",
"endpoints",
"{",
"if",
"link",
",",
"err",
":=",
"ns",
".",
"NlHandle",
"(",
")",
".",
"LinkByName",
"(",
"ep",
".",
"srcName",
")",
";",
"err",
"==",
"nil",
"{",
"if",
"err",
":=",
"ns",
".",
"NlHandle",
"(",
")",
".",
"LinkDel",
"(",
"link",
")",
";",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"WithError",
"(",
"err",
")",
".",
"Warnf",
"(",
"\"Failed to delete interface (%s)'s link on endpoint (%s) delete\"",
",",
"ep",
".",
"srcName",
",",
"ep",
".",
"id",
")",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"err",
":=",
"d",
".",
"storeDelete",
"(",
"ep",
")",
";",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Warnf",
"(",
"\"Failed to remove ipvlan endpoint %.7s from store: %v\"",
",",
"ep",
".",
"id",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"d",
".",
"deleteNetwork",
"(",
"nid",
")",
"\n",
"err",
":=",
"d",
".",
"storeDelete",
"(",
"n",
".",
"config",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"error deleting deleting id %s from datastore: %v\"",
",",
"nid",
",",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] |
// DeleteNetwork the network for the specified driver type
|
[
"DeleteNetwork",
"the",
"network",
"for",
"the",
"specified",
"driver",
"type"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/ipvlan/ipvlan_network.go#L124-L170
|
train
|
docker/libnetwork
|
drivers/ipvlan/ipvlan_network.go
|
parseNetworkOptions
|
func parseNetworkOptions(id string, option options.Generic) (*configuration, error) {
var (
err error
config = &configuration{}
)
// parse generic labels first
if genData, ok := option[netlabel.GenericData]; ok && genData != nil {
if config, err = parseNetworkGenericOptions(genData); err != nil {
return nil, err
}
}
// setting the parent to "" will trigger an isolated network dummy parent link
if _, ok := option[netlabel.Internal]; ok {
config.Internal = true
// empty --parent= and --internal are handled the same.
config.Parent = ""
}
return config, nil
}
|
go
|
func parseNetworkOptions(id string, option options.Generic) (*configuration, error) {
var (
err error
config = &configuration{}
)
// parse generic labels first
if genData, ok := option[netlabel.GenericData]; ok && genData != nil {
if config, err = parseNetworkGenericOptions(genData); err != nil {
return nil, err
}
}
// setting the parent to "" will trigger an isolated network dummy parent link
if _, ok := option[netlabel.Internal]; ok {
config.Internal = true
// empty --parent= and --internal are handled the same.
config.Parent = ""
}
return config, nil
}
|
[
"func",
"parseNetworkOptions",
"(",
"id",
"string",
",",
"option",
"options",
".",
"Generic",
")",
"(",
"*",
"configuration",
",",
"error",
")",
"{",
"var",
"(",
"err",
"error",
"\n",
"config",
"=",
"&",
"configuration",
"{",
"}",
"\n",
")",
"\n",
"if",
"genData",
",",
"ok",
":=",
"option",
"[",
"netlabel",
".",
"GenericData",
"]",
";",
"ok",
"&&",
"genData",
"!=",
"nil",
"{",
"if",
"config",
",",
"err",
"=",
"parseNetworkGenericOptions",
"(",
"genData",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"_",
",",
"ok",
":=",
"option",
"[",
"netlabel",
".",
"Internal",
"]",
";",
"ok",
"{",
"config",
".",
"Internal",
"=",
"true",
"\n",
"config",
".",
"Parent",
"=",
"\"\"",
"\n",
"}",
"\n",
"return",
"config",
",",
"nil",
"\n",
"}"
] |
// parseNetworkOptions parse docker network options
|
[
"parseNetworkOptions",
"parse",
"docker",
"network",
"options"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/ipvlan/ipvlan_network.go#L173-L191
|
train
|
docker/libnetwork
|
drivers/ipvlan/ipvlan_network.go
|
parseNetworkGenericOptions
|
func parseNetworkGenericOptions(data interface{}) (*configuration, error) {
var (
err error
config *configuration
)
switch opt := data.(type) {
case *configuration:
config = opt
case map[string]string:
config = &configuration{}
err = config.fromOptions(opt)
case options.Generic:
var opaqueConfig interface{}
if opaqueConfig, err = options.GenerateFromModel(opt, config); err == nil {
config = opaqueConfig.(*configuration)
}
default:
err = types.BadRequestErrorf("unrecognized network configuration format: %v", opt)
}
return config, err
}
|
go
|
func parseNetworkGenericOptions(data interface{}) (*configuration, error) {
var (
err error
config *configuration
)
switch opt := data.(type) {
case *configuration:
config = opt
case map[string]string:
config = &configuration{}
err = config.fromOptions(opt)
case options.Generic:
var opaqueConfig interface{}
if opaqueConfig, err = options.GenerateFromModel(opt, config); err == nil {
config = opaqueConfig.(*configuration)
}
default:
err = types.BadRequestErrorf("unrecognized network configuration format: %v", opt)
}
return config, err
}
|
[
"func",
"parseNetworkGenericOptions",
"(",
"data",
"interface",
"{",
"}",
")",
"(",
"*",
"configuration",
",",
"error",
")",
"{",
"var",
"(",
"err",
"error",
"\n",
"config",
"*",
"configuration",
"\n",
")",
"\n",
"switch",
"opt",
":=",
"data",
".",
"(",
"type",
")",
"{",
"case",
"*",
"configuration",
":",
"config",
"=",
"opt",
"\n",
"case",
"map",
"[",
"string",
"]",
"string",
":",
"config",
"=",
"&",
"configuration",
"{",
"}",
"\n",
"err",
"=",
"config",
".",
"fromOptions",
"(",
"opt",
")",
"\n",
"case",
"options",
".",
"Generic",
":",
"var",
"opaqueConfig",
"interface",
"{",
"}",
"\n",
"if",
"opaqueConfig",
",",
"err",
"=",
"options",
".",
"GenerateFromModel",
"(",
"opt",
",",
"config",
")",
";",
"err",
"==",
"nil",
"{",
"config",
"=",
"opaqueConfig",
".",
"(",
"*",
"configuration",
")",
"\n",
"}",
"\n",
"default",
":",
"err",
"=",
"types",
".",
"BadRequestErrorf",
"(",
"\"unrecognized network configuration format: %v\"",
",",
"opt",
")",
"\n",
"}",
"\n",
"return",
"config",
",",
"err",
"\n",
"}"
] |
// parseNetworkGenericOptions parse generic driver docker network options
|
[
"parseNetworkGenericOptions",
"parse",
"generic",
"driver",
"docker",
"network",
"options"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/ipvlan/ipvlan_network.go#L194-L214
|
train
|
docker/libnetwork
|
drivers/ipvlan/ipvlan_network.go
|
fromOptions
|
func (config *configuration) fromOptions(labels map[string]string) error {
for label, value := range labels {
switch label {
case parentOpt:
// parse driver option '-o parent'
config.Parent = value
case driverModeOpt:
// parse driver option '-o ipvlan_mode'
config.IpvlanMode = value
}
}
return nil
}
|
go
|
func (config *configuration) fromOptions(labels map[string]string) error {
for label, value := range labels {
switch label {
case parentOpt:
// parse driver option '-o parent'
config.Parent = value
case driverModeOpt:
// parse driver option '-o ipvlan_mode'
config.IpvlanMode = value
}
}
return nil
}
|
[
"func",
"(",
"config",
"*",
"configuration",
")",
"fromOptions",
"(",
"labels",
"map",
"[",
"string",
"]",
"string",
")",
"error",
"{",
"for",
"label",
",",
"value",
":=",
"range",
"labels",
"{",
"switch",
"label",
"{",
"case",
"parentOpt",
":",
"config",
".",
"Parent",
"=",
"value",
"\n",
"case",
"driverModeOpt",
":",
"config",
".",
"IpvlanMode",
"=",
"value",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] |
// fromOptions binds the generic options to networkConfiguration to cache
|
[
"fromOptions",
"binds",
"the",
"generic",
"options",
"to",
"networkConfiguration",
"to",
"cache"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/ipvlan/ipvlan_network.go#L217-L229
|
train
|
docker/libnetwork
|
drivers/ipvlan/ipvlan_network.go
|
processIPAM
|
func (config *configuration) processIPAM(id string, ipamV4Data, ipamV6Data []driverapi.IPAMData) error {
if len(ipamV4Data) > 0 {
for _, ipd := range ipamV4Data {
s := &ipv4Subnet{
SubnetIP: ipd.Pool.String(),
GwIP: ipd.Gateway.String(),
}
config.Ipv4Subnets = append(config.Ipv4Subnets, s)
}
}
if len(ipamV6Data) > 0 {
for _, ipd := range ipamV6Data {
s := &ipv6Subnet{
SubnetIP: ipd.Pool.String(),
GwIP: ipd.Gateway.String(),
}
config.Ipv6Subnets = append(config.Ipv6Subnets, s)
}
}
return nil
}
|
go
|
func (config *configuration) processIPAM(id string, ipamV4Data, ipamV6Data []driverapi.IPAMData) error {
if len(ipamV4Data) > 0 {
for _, ipd := range ipamV4Data {
s := &ipv4Subnet{
SubnetIP: ipd.Pool.String(),
GwIP: ipd.Gateway.String(),
}
config.Ipv4Subnets = append(config.Ipv4Subnets, s)
}
}
if len(ipamV6Data) > 0 {
for _, ipd := range ipamV6Data {
s := &ipv6Subnet{
SubnetIP: ipd.Pool.String(),
GwIP: ipd.Gateway.String(),
}
config.Ipv6Subnets = append(config.Ipv6Subnets, s)
}
}
return nil
}
|
[
"func",
"(",
"config",
"*",
"configuration",
")",
"processIPAM",
"(",
"id",
"string",
",",
"ipamV4Data",
",",
"ipamV6Data",
"[",
"]",
"driverapi",
".",
"IPAMData",
")",
"error",
"{",
"if",
"len",
"(",
"ipamV4Data",
")",
">",
"0",
"{",
"for",
"_",
",",
"ipd",
":=",
"range",
"ipamV4Data",
"{",
"s",
":=",
"&",
"ipv4Subnet",
"{",
"SubnetIP",
":",
"ipd",
".",
"Pool",
".",
"String",
"(",
")",
",",
"GwIP",
":",
"ipd",
".",
"Gateway",
".",
"String",
"(",
")",
",",
"}",
"\n",
"config",
".",
"Ipv4Subnets",
"=",
"append",
"(",
"config",
".",
"Ipv4Subnets",
",",
"s",
")",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"len",
"(",
"ipamV6Data",
")",
">",
"0",
"{",
"for",
"_",
",",
"ipd",
":=",
"range",
"ipamV6Data",
"{",
"s",
":=",
"&",
"ipv6Subnet",
"{",
"SubnetIP",
":",
"ipd",
".",
"Pool",
".",
"String",
"(",
")",
",",
"GwIP",
":",
"ipd",
".",
"Gateway",
".",
"String",
"(",
")",
",",
"}",
"\n",
"config",
".",
"Ipv6Subnets",
"=",
"append",
"(",
"config",
".",
"Ipv6Subnets",
",",
"s",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] |
// processIPAM parses v4 and v6 IP information and binds it to the network configuration
|
[
"processIPAM",
"parses",
"v4",
"and",
"v6",
"IP",
"information",
"and",
"binds",
"it",
"to",
"the",
"network",
"configuration"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/ipvlan/ipvlan_network.go#L232-L252
|
train
|
docker/libnetwork
|
hostdiscovery/hostdiscovery.go
|
NewHostDiscovery
|
func NewHostDiscovery(watcher discovery.Watcher) HostDiscovery {
return &hostDiscovery{watcher: watcher, nodes: mapset.NewSet(), stopChan: make(chan struct{})}
}
|
go
|
func NewHostDiscovery(watcher discovery.Watcher) HostDiscovery {
return &hostDiscovery{watcher: watcher, nodes: mapset.NewSet(), stopChan: make(chan struct{})}
}
|
[
"func",
"NewHostDiscovery",
"(",
"watcher",
"discovery",
".",
"Watcher",
")",
"HostDiscovery",
"{",
"return",
"&",
"hostDiscovery",
"{",
"watcher",
":",
"watcher",
",",
"nodes",
":",
"mapset",
".",
"NewSet",
"(",
")",
",",
"stopChan",
":",
"make",
"(",
"chan",
"struct",
"{",
"}",
")",
"}",
"\n",
"}"
] |
// NewHostDiscovery function creates a host discovery object
|
[
"NewHostDiscovery",
"function",
"creates",
"a",
"host",
"discovery",
"object"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/hostdiscovery/hostdiscovery.go#L33-L35
|
train
|
docker/libnetwork
|
driverapi/ipamdata.go
|
MarshalJSON
|
func (i *IPAMData) MarshalJSON() ([]byte, error) {
m := map[string]interface{}{}
m["AddressSpace"] = i.AddressSpace
if i.Pool != nil {
m["Pool"] = i.Pool.String()
}
if i.Gateway != nil {
m["Gateway"] = i.Gateway.String()
}
if i.AuxAddresses != nil {
am := make(map[string]string, len(i.AuxAddresses))
for k, v := range i.AuxAddresses {
am[k] = v.String()
}
m["AuxAddresses"] = am
}
return json.Marshal(m)
}
|
go
|
func (i *IPAMData) MarshalJSON() ([]byte, error) {
m := map[string]interface{}{}
m["AddressSpace"] = i.AddressSpace
if i.Pool != nil {
m["Pool"] = i.Pool.String()
}
if i.Gateway != nil {
m["Gateway"] = i.Gateway.String()
}
if i.AuxAddresses != nil {
am := make(map[string]string, len(i.AuxAddresses))
for k, v := range i.AuxAddresses {
am[k] = v.String()
}
m["AuxAddresses"] = am
}
return json.Marshal(m)
}
|
[
"func",
"(",
"i",
"*",
"IPAMData",
")",
"MarshalJSON",
"(",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"m",
":=",
"map",
"[",
"string",
"]",
"interface",
"{",
"}",
"{",
"}",
"\n",
"m",
"[",
"\"AddressSpace\"",
"]",
"=",
"i",
".",
"AddressSpace",
"\n",
"if",
"i",
".",
"Pool",
"!=",
"nil",
"{",
"m",
"[",
"\"Pool\"",
"]",
"=",
"i",
".",
"Pool",
".",
"String",
"(",
")",
"\n",
"}",
"\n",
"if",
"i",
".",
"Gateway",
"!=",
"nil",
"{",
"m",
"[",
"\"Gateway\"",
"]",
"=",
"i",
".",
"Gateway",
".",
"String",
"(",
")",
"\n",
"}",
"\n",
"if",
"i",
".",
"AuxAddresses",
"!=",
"nil",
"{",
"am",
":=",
"make",
"(",
"map",
"[",
"string",
"]",
"string",
",",
"len",
"(",
"i",
".",
"AuxAddresses",
")",
")",
"\n",
"for",
"k",
",",
"v",
":=",
"range",
"i",
".",
"AuxAddresses",
"{",
"am",
"[",
"k",
"]",
"=",
"v",
".",
"String",
"(",
")",
"\n",
"}",
"\n",
"m",
"[",
"\"AuxAddresses\"",
"]",
"=",
"am",
"\n",
"}",
"\n",
"return",
"json",
".",
"Marshal",
"(",
"m",
")",
"\n",
"}"
] |
// MarshalJSON encodes IPAMData into json message
|
[
"MarshalJSON",
"encodes",
"IPAMData",
"into",
"json",
"message"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/driverapi/ipamdata.go#L12-L29
|
train
|
docker/libnetwork
|
driverapi/ipamdata.go
|
UnmarshalJSON
|
func (i *IPAMData) UnmarshalJSON(data []byte) error {
var (
m map[string]interface{}
err error
)
if err := json.Unmarshal(data, &m); err != nil {
return err
}
i.AddressSpace = m["AddressSpace"].(string)
if v, ok := m["Pool"]; ok {
if i.Pool, err = types.ParseCIDR(v.(string)); err != nil {
return err
}
}
if v, ok := m["Gateway"]; ok {
if i.Gateway, err = types.ParseCIDR(v.(string)); err != nil {
return err
}
}
if v, ok := m["AuxAddresses"]; ok {
b, _ := json.Marshal(v)
var am map[string]string
if err = json.Unmarshal(b, &am); err != nil {
return err
}
i.AuxAddresses = make(map[string]*net.IPNet, len(am))
for k, v := range am {
if i.AuxAddresses[k], err = types.ParseCIDR(v); err != nil {
return err
}
}
}
return nil
}
|
go
|
func (i *IPAMData) UnmarshalJSON(data []byte) error {
var (
m map[string]interface{}
err error
)
if err := json.Unmarshal(data, &m); err != nil {
return err
}
i.AddressSpace = m["AddressSpace"].(string)
if v, ok := m["Pool"]; ok {
if i.Pool, err = types.ParseCIDR(v.(string)); err != nil {
return err
}
}
if v, ok := m["Gateway"]; ok {
if i.Gateway, err = types.ParseCIDR(v.(string)); err != nil {
return err
}
}
if v, ok := m["AuxAddresses"]; ok {
b, _ := json.Marshal(v)
var am map[string]string
if err = json.Unmarshal(b, &am); err != nil {
return err
}
i.AuxAddresses = make(map[string]*net.IPNet, len(am))
for k, v := range am {
if i.AuxAddresses[k], err = types.ParseCIDR(v); err != nil {
return err
}
}
}
return nil
}
|
[
"func",
"(",
"i",
"*",
"IPAMData",
")",
"UnmarshalJSON",
"(",
"data",
"[",
"]",
"byte",
")",
"error",
"{",
"var",
"(",
"m",
"map",
"[",
"string",
"]",
"interface",
"{",
"}",
"\n",
"err",
"error",
"\n",
")",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"data",
",",
"&",
"m",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"i",
".",
"AddressSpace",
"=",
"m",
"[",
"\"AddressSpace\"",
"]",
".",
"(",
"string",
")",
"\n",
"if",
"v",
",",
"ok",
":=",
"m",
"[",
"\"Pool\"",
"]",
";",
"ok",
"{",
"if",
"i",
".",
"Pool",
",",
"err",
"=",
"types",
".",
"ParseCIDR",
"(",
"v",
".",
"(",
"string",
")",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"v",
",",
"ok",
":=",
"m",
"[",
"\"Gateway\"",
"]",
";",
"ok",
"{",
"if",
"i",
".",
"Gateway",
",",
"err",
"=",
"types",
".",
"ParseCIDR",
"(",
"v",
".",
"(",
"string",
")",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"v",
",",
"ok",
":=",
"m",
"[",
"\"AuxAddresses\"",
"]",
";",
"ok",
"{",
"b",
",",
"_",
":=",
"json",
".",
"Marshal",
"(",
"v",
")",
"\n",
"var",
"am",
"map",
"[",
"string",
"]",
"string",
"\n",
"if",
"err",
"=",
"json",
".",
"Unmarshal",
"(",
"b",
",",
"&",
"am",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"i",
".",
"AuxAddresses",
"=",
"make",
"(",
"map",
"[",
"string",
"]",
"*",
"net",
".",
"IPNet",
",",
"len",
"(",
"am",
")",
")",
"\n",
"for",
"k",
",",
"v",
":=",
"range",
"am",
"{",
"if",
"i",
".",
"AuxAddresses",
"[",
"k",
"]",
",",
"err",
"=",
"types",
".",
"ParseCIDR",
"(",
"v",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] |
// UnmarshalJSON decodes a json message into IPAMData
|
[
"UnmarshalJSON",
"decodes",
"a",
"json",
"message",
"into",
"IPAMData"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/driverapi/ipamdata.go#L32-L65
|
train
|
docker/libnetwork
|
driverapi/ipamdata.go
|
Validate
|
func (i *IPAMData) Validate() error {
var isV6 bool
if i.Pool == nil {
return types.BadRequestErrorf("invalid pool")
}
if i.Gateway == nil {
return types.BadRequestErrorf("invalid gateway address")
}
isV6 = i.IsV6()
if isV6 && i.Gateway.IP.To4() != nil || !isV6 && i.Gateway.IP.To4() == nil {
return types.BadRequestErrorf("incongruent ip versions for pool and gateway")
}
for k, sip := range i.AuxAddresses {
if isV6 && sip.IP.To4() != nil || !isV6 && sip.IP.To4() == nil {
return types.BadRequestErrorf("incongruent ip versions for pool and secondary ip address %s", k)
}
}
if !i.Pool.Contains(i.Gateway.IP) {
return types.BadRequestErrorf("invalid gateway address (%s) does not belong to the pool (%s)", i.Gateway, i.Pool)
}
for k, sip := range i.AuxAddresses {
if !i.Pool.Contains(sip.IP) {
return types.BadRequestErrorf("invalid secondary address %s (%s) does not belong to the pool (%s)", k, i.Gateway, i.Pool)
}
}
return nil
}
|
go
|
func (i *IPAMData) Validate() error {
var isV6 bool
if i.Pool == nil {
return types.BadRequestErrorf("invalid pool")
}
if i.Gateway == nil {
return types.BadRequestErrorf("invalid gateway address")
}
isV6 = i.IsV6()
if isV6 && i.Gateway.IP.To4() != nil || !isV6 && i.Gateway.IP.To4() == nil {
return types.BadRequestErrorf("incongruent ip versions for pool and gateway")
}
for k, sip := range i.AuxAddresses {
if isV6 && sip.IP.To4() != nil || !isV6 && sip.IP.To4() == nil {
return types.BadRequestErrorf("incongruent ip versions for pool and secondary ip address %s", k)
}
}
if !i.Pool.Contains(i.Gateway.IP) {
return types.BadRequestErrorf("invalid gateway address (%s) does not belong to the pool (%s)", i.Gateway, i.Pool)
}
for k, sip := range i.AuxAddresses {
if !i.Pool.Contains(sip.IP) {
return types.BadRequestErrorf("invalid secondary address %s (%s) does not belong to the pool (%s)", k, i.Gateway, i.Pool)
}
}
return nil
}
|
[
"func",
"(",
"i",
"*",
"IPAMData",
")",
"Validate",
"(",
")",
"error",
"{",
"var",
"isV6",
"bool",
"\n",
"if",
"i",
".",
"Pool",
"==",
"nil",
"{",
"return",
"types",
".",
"BadRequestErrorf",
"(",
"\"invalid pool\"",
")",
"\n",
"}",
"\n",
"if",
"i",
".",
"Gateway",
"==",
"nil",
"{",
"return",
"types",
".",
"BadRequestErrorf",
"(",
"\"invalid gateway address\"",
")",
"\n",
"}",
"\n",
"isV6",
"=",
"i",
".",
"IsV6",
"(",
")",
"\n",
"if",
"isV6",
"&&",
"i",
".",
"Gateway",
".",
"IP",
".",
"To4",
"(",
")",
"!=",
"nil",
"||",
"!",
"isV6",
"&&",
"i",
".",
"Gateway",
".",
"IP",
".",
"To4",
"(",
")",
"==",
"nil",
"{",
"return",
"types",
".",
"BadRequestErrorf",
"(",
"\"incongruent ip versions for pool and gateway\"",
")",
"\n",
"}",
"\n",
"for",
"k",
",",
"sip",
":=",
"range",
"i",
".",
"AuxAddresses",
"{",
"if",
"isV6",
"&&",
"sip",
".",
"IP",
".",
"To4",
"(",
")",
"!=",
"nil",
"||",
"!",
"isV6",
"&&",
"sip",
".",
"IP",
".",
"To4",
"(",
")",
"==",
"nil",
"{",
"return",
"types",
".",
"BadRequestErrorf",
"(",
"\"incongruent ip versions for pool and secondary ip address %s\"",
",",
"k",
")",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"!",
"i",
".",
"Pool",
".",
"Contains",
"(",
"i",
".",
"Gateway",
".",
"IP",
")",
"{",
"return",
"types",
".",
"BadRequestErrorf",
"(",
"\"invalid gateway address (%s) does not belong to the pool (%s)\"",
",",
"i",
".",
"Gateway",
",",
"i",
".",
"Pool",
")",
"\n",
"}",
"\n",
"for",
"k",
",",
"sip",
":=",
"range",
"i",
".",
"AuxAddresses",
"{",
"if",
"!",
"i",
".",
"Pool",
".",
"Contains",
"(",
"sip",
".",
"IP",
")",
"{",
"return",
"types",
".",
"BadRequestErrorf",
"(",
"\"invalid secondary address %s (%s) does not belong to the pool (%s)\"",
",",
"k",
",",
"i",
".",
"Gateway",
",",
"i",
".",
"Pool",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] |
// Validate checks whether the IPAMData structure contains congruent data
|
[
"Validate",
"checks",
"whether",
"the",
"IPAMData",
"structure",
"contains",
"congruent",
"data"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/driverapi/ipamdata.go#L68-L94
|
train
|
docker/libnetwork
|
default_gateway.go
|
clearDefaultGW
|
func (sb *sandbox) clearDefaultGW() error {
var ep *endpoint
if ep = sb.getEndpointInGWNetwork(); ep == nil {
return nil
}
if err := ep.sbLeave(sb, false); err != nil {
return fmt.Errorf("container %s: endpoint leaving GW Network failed: %v", sb.containerID, err)
}
if err := ep.Delete(false); err != nil {
return fmt.Errorf("container %s: deleting endpoint on GW Network failed: %v", sb.containerID, err)
}
return nil
}
|
go
|
func (sb *sandbox) clearDefaultGW() error {
var ep *endpoint
if ep = sb.getEndpointInGWNetwork(); ep == nil {
return nil
}
if err := ep.sbLeave(sb, false); err != nil {
return fmt.Errorf("container %s: endpoint leaving GW Network failed: %v", sb.containerID, err)
}
if err := ep.Delete(false); err != nil {
return fmt.Errorf("container %s: deleting endpoint on GW Network failed: %v", sb.containerID, err)
}
return nil
}
|
[
"func",
"(",
"sb",
"*",
"sandbox",
")",
"clearDefaultGW",
"(",
")",
"error",
"{",
"var",
"ep",
"*",
"endpoint",
"\n",
"if",
"ep",
"=",
"sb",
".",
"getEndpointInGWNetwork",
"(",
")",
";",
"ep",
"==",
"nil",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"if",
"err",
":=",
"ep",
".",
"sbLeave",
"(",
"sb",
",",
"false",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"container %s: endpoint leaving GW Network failed: %v\"",
",",
"sb",
".",
"containerID",
",",
"err",
")",
"\n",
"}",
"\n",
"if",
"err",
":=",
"ep",
".",
"Delete",
"(",
"false",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"container %s: deleting endpoint on GW Network failed: %v\"",
",",
"sb",
".",
"containerID",
",",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] |
// If present, detach and remove the endpoint connecting the sandbox to the default gw network.
|
[
"If",
"present",
"detach",
"and",
"remove",
"the",
"endpoint",
"connecting",
"the",
"sandbox",
"to",
"the",
"default",
"gw",
"network",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/default_gateway.go#L98-L111
|
train
|
docker/libnetwork
|
default_gateway.go
|
needDefaultGW
|
func (sb *sandbox) needDefaultGW() bool {
var needGW bool
for _, ep := range sb.getConnectedEndpoints() {
if ep.endpointInGWNetwork() {
continue
}
if ep.getNetwork().Type() == "null" || ep.getNetwork().Type() == "host" {
continue
}
if ep.getNetwork().Internal() {
continue
}
// During stale sandbox cleanup, joinInfo may be nil
if ep.joinInfo != nil && ep.joinInfo.disableGatewayService {
continue
}
// TODO v6 needs to be handled.
if len(ep.Gateway()) > 0 {
return false
}
for _, r := range ep.StaticRoutes() {
if r.Destination != nil && r.Destination.String() == "0.0.0.0/0" {
return false
}
}
needGW = true
}
return needGW
}
|
go
|
func (sb *sandbox) needDefaultGW() bool {
var needGW bool
for _, ep := range sb.getConnectedEndpoints() {
if ep.endpointInGWNetwork() {
continue
}
if ep.getNetwork().Type() == "null" || ep.getNetwork().Type() == "host" {
continue
}
if ep.getNetwork().Internal() {
continue
}
// During stale sandbox cleanup, joinInfo may be nil
if ep.joinInfo != nil && ep.joinInfo.disableGatewayService {
continue
}
// TODO v6 needs to be handled.
if len(ep.Gateway()) > 0 {
return false
}
for _, r := range ep.StaticRoutes() {
if r.Destination != nil && r.Destination.String() == "0.0.0.0/0" {
return false
}
}
needGW = true
}
return needGW
}
|
[
"func",
"(",
"sb",
"*",
"sandbox",
")",
"needDefaultGW",
"(",
")",
"bool",
"{",
"var",
"needGW",
"bool",
"\n",
"for",
"_",
",",
"ep",
":=",
"range",
"sb",
".",
"getConnectedEndpoints",
"(",
")",
"{",
"if",
"ep",
".",
"endpointInGWNetwork",
"(",
")",
"{",
"continue",
"\n",
"}",
"\n",
"if",
"ep",
".",
"getNetwork",
"(",
")",
".",
"Type",
"(",
")",
"==",
"\"null\"",
"||",
"ep",
".",
"getNetwork",
"(",
")",
".",
"Type",
"(",
")",
"==",
"\"host\"",
"{",
"continue",
"\n",
"}",
"\n",
"if",
"ep",
".",
"getNetwork",
"(",
")",
".",
"Internal",
"(",
")",
"{",
"continue",
"\n",
"}",
"\n",
"if",
"ep",
".",
"joinInfo",
"!=",
"nil",
"&&",
"ep",
".",
"joinInfo",
".",
"disableGatewayService",
"{",
"continue",
"\n",
"}",
"\n",
"if",
"len",
"(",
"ep",
".",
"Gateway",
"(",
")",
")",
">",
"0",
"{",
"return",
"false",
"\n",
"}",
"\n",
"for",
"_",
",",
"r",
":=",
"range",
"ep",
".",
"StaticRoutes",
"(",
")",
"{",
"if",
"r",
".",
"Destination",
"!=",
"nil",
"&&",
"r",
".",
"Destination",
".",
"String",
"(",
")",
"==",
"\"0.0.0.0/0\"",
"{",
"return",
"false",
"\n",
"}",
"\n",
"}",
"\n",
"needGW",
"=",
"true",
"\n",
"}",
"\n",
"return",
"needGW",
"\n",
"}"
] |
// Evaluate whether the sandbox requires a default gateway based
// on the endpoints to which it is connected. It does not account
// for the default gateway network endpoint.
|
[
"Evaluate",
"whether",
"the",
"sandbox",
"requires",
"a",
"default",
"gateway",
"based",
"on",
"the",
"endpoints",
"to",
"which",
"it",
"is",
"connected",
".",
"It",
"does",
"not",
"account",
"for",
"the",
"default",
"gateway",
"network",
"endpoint",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/default_gateway.go#L117-L147
|
train
|
docker/libnetwork
|
default_gateway.go
|
defaultGwNetwork
|
func (c *controller) defaultGwNetwork() (Network, error) {
procGwNetwork <- true
defer func() { <-procGwNetwork }()
n, err := c.NetworkByName(libnGWNetwork)
if _, ok := err.(types.NotFoundError); ok {
n, err = c.createGWNetwork()
}
return n, err
}
|
go
|
func (c *controller) defaultGwNetwork() (Network, error) {
procGwNetwork <- true
defer func() { <-procGwNetwork }()
n, err := c.NetworkByName(libnGWNetwork)
if _, ok := err.(types.NotFoundError); ok {
n, err = c.createGWNetwork()
}
return n, err
}
|
[
"func",
"(",
"c",
"*",
"controller",
")",
"defaultGwNetwork",
"(",
")",
"(",
"Network",
",",
"error",
")",
"{",
"procGwNetwork",
"<-",
"true",
"\n",
"defer",
"func",
"(",
")",
"{",
"<-",
"procGwNetwork",
"}",
"(",
")",
"\n",
"n",
",",
"err",
":=",
"c",
".",
"NetworkByName",
"(",
"libnGWNetwork",
")",
"\n",
"if",
"_",
",",
"ok",
":=",
"err",
".",
"(",
"types",
".",
"NotFoundError",
")",
";",
"ok",
"{",
"n",
",",
"err",
"=",
"c",
".",
"createGWNetwork",
"(",
")",
"\n",
"}",
"\n",
"return",
"n",
",",
"err",
"\n",
"}"
] |
// Looks for the default gw network and creates it if not there.
// Parallel executions are serialized.
|
[
"Looks",
"for",
"the",
"default",
"gw",
"network",
"and",
"creates",
"it",
"if",
"not",
"there",
".",
"Parallel",
"executions",
"are",
"serialized",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/default_gateway.go#L179-L188
|
train
|
docker/libnetwork
|
default_gateway.go
|
getGatewayEndpoint
|
func (sb *sandbox) getGatewayEndpoint() *endpoint {
for _, ep := range sb.getConnectedEndpoints() {
if ep.getNetwork().Type() == "null" || ep.getNetwork().Type() == "host" {
continue
}
if len(ep.Gateway()) != 0 {
return ep
}
}
return nil
}
|
go
|
func (sb *sandbox) getGatewayEndpoint() *endpoint {
for _, ep := range sb.getConnectedEndpoints() {
if ep.getNetwork().Type() == "null" || ep.getNetwork().Type() == "host" {
continue
}
if len(ep.Gateway()) != 0 {
return ep
}
}
return nil
}
|
[
"func",
"(",
"sb",
"*",
"sandbox",
")",
"getGatewayEndpoint",
"(",
")",
"*",
"endpoint",
"{",
"for",
"_",
",",
"ep",
":=",
"range",
"sb",
".",
"getConnectedEndpoints",
"(",
")",
"{",
"if",
"ep",
".",
"getNetwork",
"(",
")",
".",
"Type",
"(",
")",
"==",
"\"null\"",
"||",
"ep",
".",
"getNetwork",
"(",
")",
".",
"Type",
"(",
")",
"==",
"\"host\"",
"{",
"continue",
"\n",
"}",
"\n",
"if",
"len",
"(",
"ep",
".",
"Gateway",
"(",
")",
")",
"!=",
"0",
"{",
"return",
"ep",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] |
// Returns the endpoint which is providing external connectivity to the sandbox
|
[
"Returns",
"the",
"endpoint",
"which",
"is",
"providing",
"external",
"connectivity",
"to",
"the",
"sandbox"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/default_gateway.go#L191-L201
|
train
|
docker/libnetwork
|
netutils/utils.go
|
CheckNameserverOverlaps
|
func CheckNameserverOverlaps(nameservers []string, toCheck *net.IPNet) error {
if len(nameservers) > 0 {
for _, ns := range nameservers {
_, nsNetwork, err := net.ParseCIDR(ns)
if err != nil {
return err
}
if NetworkOverlaps(toCheck, nsNetwork) {
return ErrNetworkOverlapsWithNameservers
}
}
}
return nil
}
|
go
|
func CheckNameserverOverlaps(nameservers []string, toCheck *net.IPNet) error {
if len(nameservers) > 0 {
for _, ns := range nameservers {
_, nsNetwork, err := net.ParseCIDR(ns)
if err != nil {
return err
}
if NetworkOverlaps(toCheck, nsNetwork) {
return ErrNetworkOverlapsWithNameservers
}
}
}
return nil
}
|
[
"func",
"CheckNameserverOverlaps",
"(",
"nameservers",
"[",
"]",
"string",
",",
"toCheck",
"*",
"net",
".",
"IPNet",
")",
"error",
"{",
"if",
"len",
"(",
"nameservers",
")",
">",
"0",
"{",
"for",
"_",
",",
"ns",
":=",
"range",
"nameservers",
"{",
"_",
",",
"nsNetwork",
",",
"err",
":=",
"net",
".",
"ParseCIDR",
"(",
"ns",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"if",
"NetworkOverlaps",
"(",
"toCheck",
",",
"nsNetwork",
")",
"{",
"return",
"ErrNetworkOverlapsWithNameservers",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] |
// CheckNameserverOverlaps checks whether the passed network overlaps with any of the nameservers
|
[
"CheckNameserverOverlaps",
"checks",
"whether",
"the",
"passed",
"network",
"overlaps",
"with",
"any",
"of",
"the",
"nameservers"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/netutils/utils.go#L27-L40
|
train
|
docker/libnetwork
|
netutils/utils.go
|
NetworkOverlaps
|
func NetworkOverlaps(netX *net.IPNet, netY *net.IPNet) bool {
return netX.Contains(netY.IP) || netY.Contains(netX.IP)
}
|
go
|
func NetworkOverlaps(netX *net.IPNet, netY *net.IPNet) bool {
return netX.Contains(netY.IP) || netY.Contains(netX.IP)
}
|
[
"func",
"NetworkOverlaps",
"(",
"netX",
"*",
"net",
".",
"IPNet",
",",
"netY",
"*",
"net",
".",
"IPNet",
")",
"bool",
"{",
"return",
"netX",
".",
"Contains",
"(",
"netY",
".",
"IP",
")",
"||",
"netY",
".",
"Contains",
"(",
"netX",
".",
"IP",
")",
"\n",
"}"
] |
// NetworkOverlaps detects overlap between one IPNet and another
|
[
"NetworkOverlaps",
"detects",
"overlap",
"between",
"one",
"IPNet",
"and",
"another"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/netutils/utils.go#L43-L45
|
train
|
docker/libnetwork
|
netutils/utils.go
|
NetworkRange
|
func NetworkRange(network *net.IPNet) (net.IP, net.IP) {
if network == nil {
return nil, nil
}
firstIP := network.IP.Mask(network.Mask)
lastIP := types.GetIPCopy(firstIP)
for i := 0; i < len(firstIP); i++ {
lastIP[i] = firstIP[i] | ^network.Mask[i]
}
if network.IP.To4() != nil {
firstIP = firstIP.To4()
lastIP = lastIP.To4()
}
return firstIP, lastIP
}
|
go
|
func NetworkRange(network *net.IPNet) (net.IP, net.IP) {
if network == nil {
return nil, nil
}
firstIP := network.IP.Mask(network.Mask)
lastIP := types.GetIPCopy(firstIP)
for i := 0; i < len(firstIP); i++ {
lastIP[i] = firstIP[i] | ^network.Mask[i]
}
if network.IP.To4() != nil {
firstIP = firstIP.To4()
lastIP = lastIP.To4()
}
return firstIP, lastIP
}
|
[
"func",
"NetworkRange",
"(",
"network",
"*",
"net",
".",
"IPNet",
")",
"(",
"net",
".",
"IP",
",",
"net",
".",
"IP",
")",
"{",
"if",
"network",
"==",
"nil",
"{",
"return",
"nil",
",",
"nil",
"\n",
"}",
"\n",
"firstIP",
":=",
"network",
".",
"IP",
".",
"Mask",
"(",
"network",
".",
"Mask",
")",
"\n",
"lastIP",
":=",
"types",
".",
"GetIPCopy",
"(",
"firstIP",
")",
"\n",
"for",
"i",
":=",
"0",
";",
"i",
"<",
"len",
"(",
"firstIP",
")",
";",
"i",
"++",
"{",
"lastIP",
"[",
"i",
"]",
"=",
"firstIP",
"[",
"i",
"]",
"|",
"^",
"network",
".",
"Mask",
"[",
"i",
"]",
"\n",
"}",
"\n",
"if",
"network",
".",
"IP",
".",
"To4",
"(",
")",
"!=",
"nil",
"{",
"firstIP",
"=",
"firstIP",
".",
"To4",
"(",
")",
"\n",
"lastIP",
"=",
"lastIP",
".",
"To4",
"(",
")",
"\n",
"}",
"\n",
"return",
"firstIP",
",",
"lastIP",
"\n",
"}"
] |
// NetworkRange calculates the first and last IP addresses in an IPNet
|
[
"NetworkRange",
"calculates",
"the",
"first",
"and",
"last",
"IP",
"addresses",
"in",
"an",
"IPNet"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/netutils/utils.go#L48-L65
|
train
|
docker/libnetwork
|
netutils/utils.go
|
GetIfaceAddr
|
func GetIfaceAddr(name string) (net.Addr, []net.Addr, error) {
iface, err := net.InterfaceByName(name)
if err != nil {
return nil, nil, err
}
addrs, err := iface.Addrs()
if err != nil {
return nil, nil, err
}
var addrs4 []net.Addr
var addrs6 []net.Addr
for _, addr := range addrs {
ip := (addr.(*net.IPNet)).IP
if ip4 := ip.To4(); ip4 != nil {
addrs4 = append(addrs4, addr)
} else if ip6 := ip.To16(); len(ip6) == net.IPv6len {
addrs6 = append(addrs6, addr)
}
}
switch {
case len(addrs4) == 0:
return nil, nil, fmt.Errorf("Interface %v has no IPv4 addresses", name)
case len(addrs4) > 1:
fmt.Printf("Interface %v has more than 1 IPv4 address. Defaulting to using %v\n",
name, (addrs4[0].(*net.IPNet)).IP)
}
return addrs4[0], addrs6, nil
}
|
go
|
func GetIfaceAddr(name string) (net.Addr, []net.Addr, error) {
iface, err := net.InterfaceByName(name)
if err != nil {
return nil, nil, err
}
addrs, err := iface.Addrs()
if err != nil {
return nil, nil, err
}
var addrs4 []net.Addr
var addrs6 []net.Addr
for _, addr := range addrs {
ip := (addr.(*net.IPNet)).IP
if ip4 := ip.To4(); ip4 != nil {
addrs4 = append(addrs4, addr)
} else if ip6 := ip.To16(); len(ip6) == net.IPv6len {
addrs6 = append(addrs6, addr)
}
}
switch {
case len(addrs4) == 0:
return nil, nil, fmt.Errorf("Interface %v has no IPv4 addresses", name)
case len(addrs4) > 1:
fmt.Printf("Interface %v has more than 1 IPv4 address. Defaulting to using %v\n",
name, (addrs4[0].(*net.IPNet)).IP)
}
return addrs4[0], addrs6, nil
}
|
[
"func",
"GetIfaceAddr",
"(",
"name",
"string",
")",
"(",
"net",
".",
"Addr",
",",
"[",
"]",
"net",
".",
"Addr",
",",
"error",
")",
"{",
"iface",
",",
"err",
":=",
"net",
".",
"InterfaceByName",
"(",
"name",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"addrs",
",",
"err",
":=",
"iface",
".",
"Addrs",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"var",
"addrs4",
"[",
"]",
"net",
".",
"Addr",
"\n",
"var",
"addrs6",
"[",
"]",
"net",
".",
"Addr",
"\n",
"for",
"_",
",",
"addr",
":=",
"range",
"addrs",
"{",
"ip",
":=",
"(",
"addr",
".",
"(",
"*",
"net",
".",
"IPNet",
")",
")",
".",
"IP",
"\n",
"if",
"ip4",
":=",
"ip",
".",
"To4",
"(",
")",
";",
"ip4",
"!=",
"nil",
"{",
"addrs4",
"=",
"append",
"(",
"addrs4",
",",
"addr",
")",
"\n",
"}",
"else",
"if",
"ip6",
":=",
"ip",
".",
"To16",
"(",
")",
";",
"len",
"(",
"ip6",
")",
"==",
"net",
".",
"IPv6len",
"{",
"addrs6",
"=",
"append",
"(",
"addrs6",
",",
"addr",
")",
"\n",
"}",
"\n",
"}",
"\n",
"switch",
"{",
"case",
"len",
"(",
"addrs4",
")",
"==",
"0",
":",
"return",
"nil",
",",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"Interface %v has no IPv4 addresses\"",
",",
"name",
")",
"\n",
"case",
"len",
"(",
"addrs4",
")",
">",
"1",
":",
"fmt",
".",
"Printf",
"(",
"\"Interface %v has more than 1 IPv4 address. Defaulting to using %v\\n\"",
",",
"\\n",
",",
"name",
")",
"\n",
"}",
"\n",
"(",
"addrs4",
"[",
"0",
"]",
".",
"(",
"*",
"net",
".",
"IPNet",
")",
")",
".",
"IP",
"\n",
"}"
] |
// GetIfaceAddr returns the first IPv4 address and slice of IPv6 addresses for the specified network interface
|
[
"GetIfaceAddr",
"returns",
"the",
"first",
"IPv4",
"address",
"and",
"slice",
"of",
"IPv6",
"addresses",
"for",
"the",
"specified",
"network",
"interface"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/netutils/utils.go#L68-L95
|
train
|
docker/libnetwork
|
netutils/utils.go
|
GenerateRandomName
|
func GenerateRandomName(prefix string, size int) (string, error) {
id := make([]byte, 32)
if _, err := io.ReadFull(rand.Reader, id); err != nil {
return "", err
}
return prefix + hex.EncodeToString(id)[:size], nil
}
|
go
|
func GenerateRandomName(prefix string, size int) (string, error) {
id := make([]byte, 32)
if _, err := io.ReadFull(rand.Reader, id); err != nil {
return "", err
}
return prefix + hex.EncodeToString(id)[:size], nil
}
|
[
"func",
"GenerateRandomName",
"(",
"prefix",
"string",
",",
"size",
"int",
")",
"(",
"string",
",",
"error",
")",
"{",
"id",
":=",
"make",
"(",
"[",
"]",
"byte",
",",
"32",
")",
"\n",
"if",
"_",
",",
"err",
":=",
"io",
".",
"ReadFull",
"(",
"rand",
".",
"Reader",
",",
"id",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"\"\"",
",",
"err",
"\n",
"}",
"\n",
"return",
"prefix",
"+",
"hex",
".",
"EncodeToString",
"(",
"id",
")",
"[",
":",
"size",
"]",
",",
"nil",
"\n",
"}"
] |
// GenerateRandomName returns a new name joined with a prefix. This size
// specified is used to truncate the randomly generated value
|
[
"GenerateRandomName",
"returns",
"a",
"new",
"name",
"joined",
"with",
"a",
"prefix",
".",
"This",
"size",
"specified",
"is",
"used",
"to",
"truncate",
"the",
"randomly",
"generated",
"value"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/netutils/utils.go#L129-L135
|
train
|
docker/libnetwork
|
netutils/utils.go
|
ReverseIP
|
func ReverseIP(IP string) string {
var reverseIP []string
if net.ParseIP(IP).To4() != nil {
reverseIP = strings.Split(IP, ".")
l := len(reverseIP)
for i, j := 0, l-1; i < l/2; i, j = i+1, j-1 {
reverseIP[i], reverseIP[j] = reverseIP[j], reverseIP[i]
}
} else {
reverseIP = strings.Split(IP, ":")
// Reversed IPv6 is represented in dotted decimal instead of the typical
// colon hex notation
for key := range reverseIP {
if len(reverseIP[key]) == 0 { // expand the compressed 0s
reverseIP[key] = strings.Repeat("0000", 8-strings.Count(IP, ":"))
} else if len(reverseIP[key]) < 4 { // 0-padding needed
reverseIP[key] = strings.Repeat("0", 4-len(reverseIP[key])) + reverseIP[key]
}
}
reverseIP = strings.Split(strings.Join(reverseIP, ""), "")
l := len(reverseIP)
for i, j := 0, l-1; i < l/2; i, j = i+1, j-1 {
reverseIP[i], reverseIP[j] = reverseIP[j], reverseIP[i]
}
}
return strings.Join(reverseIP, ".")
}
|
go
|
func ReverseIP(IP string) string {
var reverseIP []string
if net.ParseIP(IP).To4() != nil {
reverseIP = strings.Split(IP, ".")
l := len(reverseIP)
for i, j := 0, l-1; i < l/2; i, j = i+1, j-1 {
reverseIP[i], reverseIP[j] = reverseIP[j], reverseIP[i]
}
} else {
reverseIP = strings.Split(IP, ":")
// Reversed IPv6 is represented in dotted decimal instead of the typical
// colon hex notation
for key := range reverseIP {
if len(reverseIP[key]) == 0 { // expand the compressed 0s
reverseIP[key] = strings.Repeat("0000", 8-strings.Count(IP, ":"))
} else if len(reverseIP[key]) < 4 { // 0-padding needed
reverseIP[key] = strings.Repeat("0", 4-len(reverseIP[key])) + reverseIP[key]
}
}
reverseIP = strings.Split(strings.Join(reverseIP, ""), "")
l := len(reverseIP)
for i, j := 0, l-1; i < l/2; i, j = i+1, j-1 {
reverseIP[i], reverseIP[j] = reverseIP[j], reverseIP[i]
}
}
return strings.Join(reverseIP, ".")
}
|
[
"func",
"ReverseIP",
"(",
"IP",
"string",
")",
"string",
"{",
"var",
"reverseIP",
"[",
"]",
"string",
"\n",
"if",
"net",
".",
"ParseIP",
"(",
"IP",
")",
".",
"To4",
"(",
")",
"!=",
"nil",
"{",
"reverseIP",
"=",
"strings",
".",
"Split",
"(",
"IP",
",",
"\".\"",
")",
"\n",
"l",
":=",
"len",
"(",
"reverseIP",
")",
"\n",
"for",
"i",
",",
"j",
":=",
"0",
",",
"l",
"-",
"1",
";",
"i",
"<",
"l",
"/",
"2",
";",
"i",
",",
"j",
"=",
"i",
"+",
"1",
",",
"j",
"-",
"1",
"{",
"reverseIP",
"[",
"i",
"]",
",",
"reverseIP",
"[",
"j",
"]",
"=",
"reverseIP",
"[",
"j",
"]",
",",
"reverseIP",
"[",
"i",
"]",
"\n",
"}",
"\n",
"}",
"else",
"{",
"reverseIP",
"=",
"strings",
".",
"Split",
"(",
"IP",
",",
"\":\"",
")",
"\n",
"for",
"key",
":=",
"range",
"reverseIP",
"{",
"if",
"len",
"(",
"reverseIP",
"[",
"key",
"]",
")",
"==",
"0",
"{",
"reverseIP",
"[",
"key",
"]",
"=",
"strings",
".",
"Repeat",
"(",
"\"0000\"",
",",
"8",
"-",
"strings",
".",
"Count",
"(",
"IP",
",",
"\":\"",
")",
")",
"\n",
"}",
"else",
"if",
"len",
"(",
"reverseIP",
"[",
"key",
"]",
")",
"<",
"4",
"{",
"reverseIP",
"[",
"key",
"]",
"=",
"strings",
".",
"Repeat",
"(",
"\"0\"",
",",
"4",
"-",
"len",
"(",
"reverseIP",
"[",
"key",
"]",
")",
")",
"+",
"reverseIP",
"[",
"key",
"]",
"\n",
"}",
"\n",
"}",
"\n",
"reverseIP",
"=",
"strings",
".",
"Split",
"(",
"strings",
".",
"Join",
"(",
"reverseIP",
",",
"\"\"",
")",
",",
"\"\"",
")",
"\n",
"l",
":=",
"len",
"(",
"reverseIP",
")",
"\n",
"for",
"i",
",",
"j",
":=",
"0",
",",
"l",
"-",
"1",
";",
"i",
"<",
"l",
"/",
"2",
";",
"i",
",",
"j",
"=",
"i",
"+",
"1",
",",
"j",
"-",
"1",
"{",
"reverseIP",
"[",
"i",
"]",
",",
"reverseIP",
"[",
"j",
"]",
"=",
"reverseIP",
"[",
"j",
"]",
",",
"reverseIP",
"[",
"i",
"]",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"strings",
".",
"Join",
"(",
"reverseIP",
",",
"\".\"",
")",
"\n",
"}"
] |
// ReverseIP accepts a V4 or V6 IP string in the canonical form and returns a reversed IP in
// the dotted decimal form . This is used to setup the IP to service name mapping in the optimal
// way for the DNS PTR queries.
|
[
"ReverseIP",
"accepts",
"a",
"V4",
"or",
"V6",
"IP",
"string",
"in",
"the",
"canonical",
"form",
"and",
"returns",
"a",
"reversed",
"IP",
"in",
"the",
"dotted",
"decimal",
"form",
".",
"This",
"is",
"used",
"to",
"setup",
"the",
"IP",
"to",
"service",
"name",
"mapping",
"in",
"the",
"optimal",
"way",
"for",
"the",
"DNS",
"PTR",
"queries",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/netutils/utils.go#L140-L171
|
train
|
docker/libnetwork
|
ipvs/netlink.go
|
assembleService
|
func assembleService(attrs []syscall.NetlinkRouteAttr) (*Service, error) {
var s Service
for _, attr := range attrs {
attrType := int(attr.Attr.Type)
switch attrType {
case ipvsSvcAttrAddressFamily:
s.AddressFamily = native.Uint16(attr.Value)
case ipvsSvcAttrProtocol:
s.Protocol = native.Uint16(attr.Value)
case ipvsSvcAttrAddress:
ip, err := parseIP(attr.Value, s.AddressFamily)
if err != nil {
return nil, err
}
s.Address = ip
case ipvsSvcAttrPort:
s.Port = binary.BigEndian.Uint16(attr.Value)
case ipvsSvcAttrFWMark:
s.FWMark = native.Uint32(attr.Value)
case ipvsSvcAttrSchedName:
s.SchedName = nl.BytesToString(attr.Value)
case ipvsSvcAttrFlags:
s.Flags = native.Uint32(attr.Value)
case ipvsSvcAttrTimeout:
s.Timeout = native.Uint32(attr.Value)
case ipvsSvcAttrNetmask:
s.Netmask = native.Uint32(attr.Value)
case ipvsSvcAttrStats:
stats, err := assembleStats(attr.Value)
if err != nil {
return nil, err
}
s.Stats = stats
}
}
return &s, nil
}
|
go
|
func assembleService(attrs []syscall.NetlinkRouteAttr) (*Service, error) {
var s Service
for _, attr := range attrs {
attrType := int(attr.Attr.Type)
switch attrType {
case ipvsSvcAttrAddressFamily:
s.AddressFamily = native.Uint16(attr.Value)
case ipvsSvcAttrProtocol:
s.Protocol = native.Uint16(attr.Value)
case ipvsSvcAttrAddress:
ip, err := parseIP(attr.Value, s.AddressFamily)
if err != nil {
return nil, err
}
s.Address = ip
case ipvsSvcAttrPort:
s.Port = binary.BigEndian.Uint16(attr.Value)
case ipvsSvcAttrFWMark:
s.FWMark = native.Uint32(attr.Value)
case ipvsSvcAttrSchedName:
s.SchedName = nl.BytesToString(attr.Value)
case ipvsSvcAttrFlags:
s.Flags = native.Uint32(attr.Value)
case ipvsSvcAttrTimeout:
s.Timeout = native.Uint32(attr.Value)
case ipvsSvcAttrNetmask:
s.Netmask = native.Uint32(attr.Value)
case ipvsSvcAttrStats:
stats, err := assembleStats(attr.Value)
if err != nil {
return nil, err
}
s.Stats = stats
}
}
return &s, nil
}
|
[
"func",
"assembleService",
"(",
"attrs",
"[",
"]",
"syscall",
".",
"NetlinkRouteAttr",
")",
"(",
"*",
"Service",
",",
"error",
")",
"{",
"var",
"s",
"Service",
"\n",
"for",
"_",
",",
"attr",
":=",
"range",
"attrs",
"{",
"attrType",
":=",
"int",
"(",
"attr",
".",
"Attr",
".",
"Type",
")",
"\n",
"switch",
"attrType",
"{",
"case",
"ipvsSvcAttrAddressFamily",
":",
"s",
".",
"AddressFamily",
"=",
"native",
".",
"Uint16",
"(",
"attr",
".",
"Value",
")",
"\n",
"case",
"ipvsSvcAttrProtocol",
":",
"s",
".",
"Protocol",
"=",
"native",
".",
"Uint16",
"(",
"attr",
".",
"Value",
")",
"\n",
"case",
"ipvsSvcAttrAddress",
":",
"ip",
",",
"err",
":=",
"parseIP",
"(",
"attr",
".",
"Value",
",",
"s",
".",
"AddressFamily",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"s",
".",
"Address",
"=",
"ip",
"\n",
"case",
"ipvsSvcAttrPort",
":",
"s",
".",
"Port",
"=",
"binary",
".",
"BigEndian",
".",
"Uint16",
"(",
"attr",
".",
"Value",
")",
"\n",
"case",
"ipvsSvcAttrFWMark",
":",
"s",
".",
"FWMark",
"=",
"native",
".",
"Uint32",
"(",
"attr",
".",
"Value",
")",
"\n",
"case",
"ipvsSvcAttrSchedName",
":",
"s",
".",
"SchedName",
"=",
"nl",
".",
"BytesToString",
"(",
"attr",
".",
"Value",
")",
"\n",
"case",
"ipvsSvcAttrFlags",
":",
"s",
".",
"Flags",
"=",
"native",
".",
"Uint32",
"(",
"attr",
".",
"Value",
")",
"\n",
"case",
"ipvsSvcAttrTimeout",
":",
"s",
".",
"Timeout",
"=",
"native",
".",
"Uint32",
"(",
"attr",
".",
"Value",
")",
"\n",
"case",
"ipvsSvcAttrNetmask",
":",
"s",
".",
"Netmask",
"=",
"native",
".",
"Uint32",
"(",
"attr",
".",
"Value",
")",
"\n",
"case",
"ipvsSvcAttrStats",
":",
"stats",
",",
"err",
":=",
"assembleStats",
"(",
"attr",
".",
"Value",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"s",
".",
"Stats",
"=",
"stats",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"&",
"s",
",",
"nil",
"\n",
"}"
] |
// assembleService assembles a services back from a hain of netlink attributes
|
[
"assembleService",
"assembles",
"a",
"services",
"back",
"from",
"a",
"hain",
"of",
"netlink",
"attributes"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/netlink.go#L315-L357
|
train
|
docker/libnetwork
|
ipvs/netlink.go
|
parseService
|
func (i *Handle) parseService(msg []byte) (*Service, error) {
var s *Service
//Remove General header for this message and parse the NetLink message
hdr := deserializeGenlMsg(msg)
NetLinkAttrs, err := nl.ParseRouteAttr(msg[hdr.Len():])
if err != nil {
return nil, err
}
if len(NetLinkAttrs) == 0 {
return nil, fmt.Errorf("error no valid netlink message found while parsing service record")
}
//Now Parse and get IPVS related attributes messages packed in this message.
ipvsAttrs, err := nl.ParseRouteAttr(NetLinkAttrs[0].Value)
if err != nil {
return nil, err
}
//Assemble all the IPVS related attribute messages and create a service record
s, err = assembleService(ipvsAttrs)
if err != nil {
return nil, err
}
return s, nil
}
|
go
|
func (i *Handle) parseService(msg []byte) (*Service, error) {
var s *Service
//Remove General header for this message and parse the NetLink message
hdr := deserializeGenlMsg(msg)
NetLinkAttrs, err := nl.ParseRouteAttr(msg[hdr.Len():])
if err != nil {
return nil, err
}
if len(NetLinkAttrs) == 0 {
return nil, fmt.Errorf("error no valid netlink message found while parsing service record")
}
//Now Parse and get IPVS related attributes messages packed in this message.
ipvsAttrs, err := nl.ParseRouteAttr(NetLinkAttrs[0].Value)
if err != nil {
return nil, err
}
//Assemble all the IPVS related attribute messages and create a service record
s, err = assembleService(ipvsAttrs)
if err != nil {
return nil, err
}
return s, nil
}
|
[
"func",
"(",
"i",
"*",
"Handle",
")",
"parseService",
"(",
"msg",
"[",
"]",
"byte",
")",
"(",
"*",
"Service",
",",
"error",
")",
"{",
"var",
"s",
"*",
"Service",
"\n",
"hdr",
":=",
"deserializeGenlMsg",
"(",
"msg",
")",
"\n",
"NetLinkAttrs",
",",
"err",
":=",
"nl",
".",
"ParseRouteAttr",
"(",
"msg",
"[",
"hdr",
".",
"Len",
"(",
")",
":",
"]",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"len",
"(",
"NetLinkAttrs",
")",
"==",
"0",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"error no valid netlink message found while parsing service record\"",
")",
"\n",
"}",
"\n",
"ipvsAttrs",
",",
"err",
":=",
"nl",
".",
"ParseRouteAttr",
"(",
"NetLinkAttrs",
"[",
"0",
"]",
".",
"Value",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"s",
",",
"err",
"=",
"assembleService",
"(",
"ipvsAttrs",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"s",
",",
"nil",
"\n",
"}"
] |
// parseService given a ipvs netlink response this function will respond with a valid service entry, an error otherwise
|
[
"parseService",
"given",
"a",
"ipvs",
"netlink",
"response",
"this",
"function",
"will",
"respond",
"with",
"a",
"valid",
"service",
"entry",
"an",
"error",
"otherwise"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/netlink.go#L360-L387
|
train
|
docker/libnetwork
|
ipvs/netlink.go
|
doCmdWithoutAttr
|
func (i *Handle) doCmdWithoutAttr(cmd uint8) ([][]byte, error) {
req := newIPVSRequest(cmd)
req.Seq = atomic.AddUint32(&i.seq, 1)
return execute(i.sock, req, 0)
}
|
go
|
func (i *Handle) doCmdWithoutAttr(cmd uint8) ([][]byte, error) {
req := newIPVSRequest(cmd)
req.Seq = atomic.AddUint32(&i.seq, 1)
return execute(i.sock, req, 0)
}
|
[
"func",
"(",
"i",
"*",
"Handle",
")",
"doCmdWithoutAttr",
"(",
"cmd",
"uint8",
")",
"(",
"[",
"]",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"req",
":=",
"newIPVSRequest",
"(",
"cmd",
")",
"\n",
"req",
".",
"Seq",
"=",
"atomic",
".",
"AddUint32",
"(",
"&",
"i",
".",
"seq",
",",
"1",
")",
"\n",
"return",
"execute",
"(",
"i",
".",
"sock",
",",
"req",
",",
"0",
")",
"\n",
"}"
] |
// doCmdWithoutAttr a simple wrapper of netlink socket execute command
|
[
"doCmdWithoutAttr",
"a",
"simple",
"wrapper",
"of",
"netlink",
"socket",
"execute",
"command"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/netlink.go#L410-L414
|
train
|
docker/libnetwork
|
ipvs/netlink.go
|
parseDestination
|
func (i *Handle) parseDestination(msg []byte) (*Destination, error) {
var dst *Destination
//Remove General header for this message
hdr := deserializeGenlMsg(msg)
NetLinkAttrs, err := nl.ParseRouteAttr(msg[hdr.Len():])
if err != nil {
return nil, err
}
if len(NetLinkAttrs) == 0 {
return nil, fmt.Errorf("error no valid netlink message found while parsing destination record")
}
//Now Parse and get IPVS related attributes messages packed in this message.
ipvsAttrs, err := nl.ParseRouteAttr(NetLinkAttrs[0].Value)
if err != nil {
return nil, err
}
//Assemble netlink attributes and create a Destination record
dst, err = assembleDestination(ipvsAttrs)
if err != nil {
return nil, err
}
return dst, nil
}
|
go
|
func (i *Handle) parseDestination(msg []byte) (*Destination, error) {
var dst *Destination
//Remove General header for this message
hdr := deserializeGenlMsg(msg)
NetLinkAttrs, err := nl.ParseRouteAttr(msg[hdr.Len():])
if err != nil {
return nil, err
}
if len(NetLinkAttrs) == 0 {
return nil, fmt.Errorf("error no valid netlink message found while parsing destination record")
}
//Now Parse and get IPVS related attributes messages packed in this message.
ipvsAttrs, err := nl.ParseRouteAttr(NetLinkAttrs[0].Value)
if err != nil {
return nil, err
}
//Assemble netlink attributes and create a Destination record
dst, err = assembleDestination(ipvsAttrs)
if err != nil {
return nil, err
}
return dst, nil
}
|
[
"func",
"(",
"i",
"*",
"Handle",
")",
"parseDestination",
"(",
"msg",
"[",
"]",
"byte",
")",
"(",
"*",
"Destination",
",",
"error",
")",
"{",
"var",
"dst",
"*",
"Destination",
"\n",
"hdr",
":=",
"deserializeGenlMsg",
"(",
"msg",
")",
"\n",
"NetLinkAttrs",
",",
"err",
":=",
"nl",
".",
"ParseRouteAttr",
"(",
"msg",
"[",
"hdr",
".",
"Len",
"(",
")",
":",
"]",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"len",
"(",
"NetLinkAttrs",
")",
"==",
"0",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"error no valid netlink message found while parsing destination record\"",
")",
"\n",
"}",
"\n",
"ipvsAttrs",
",",
"err",
":=",
"nl",
".",
"ParseRouteAttr",
"(",
"NetLinkAttrs",
"[",
"0",
"]",
".",
"Value",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"dst",
",",
"err",
"=",
"assembleDestination",
"(",
"ipvsAttrs",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"dst",
",",
"nil",
"\n",
"}"
] |
// parseDestination given a ipvs netlink response this function will respond with a valid destination entry, an error otherwise
|
[
"parseDestination",
"given",
"a",
"ipvs",
"netlink",
"response",
"this",
"function",
"will",
"respond",
"with",
"a",
"valid",
"destination",
"entry",
"an",
"error",
"otherwise"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/netlink.go#L459-L485
|
train
|
docker/libnetwork
|
ipvs/netlink.go
|
parseConfig
|
func (i *Handle) parseConfig(msg []byte) (*Config, error) {
var c Config
//Remove General header for this message
hdr := deserializeGenlMsg(msg)
attrs, err := nl.ParseRouteAttr(msg[hdr.Len():])
if err != nil {
return nil, err
}
for _, attr := range attrs {
attrType := int(attr.Attr.Type)
switch attrType {
case ipvsCmdAttrTimeoutTCP:
c.TimeoutTCP = time.Duration(native.Uint32(attr.Value)) * time.Second
case ipvsCmdAttrTimeoutTCPFin:
c.TimeoutTCPFin = time.Duration(native.Uint32(attr.Value)) * time.Second
case ipvsCmdAttrTimeoutUDP:
c.TimeoutUDP = time.Duration(native.Uint32(attr.Value)) * time.Second
}
}
return &c, nil
}
|
go
|
func (i *Handle) parseConfig(msg []byte) (*Config, error) {
var c Config
//Remove General header for this message
hdr := deserializeGenlMsg(msg)
attrs, err := nl.ParseRouteAttr(msg[hdr.Len():])
if err != nil {
return nil, err
}
for _, attr := range attrs {
attrType := int(attr.Attr.Type)
switch attrType {
case ipvsCmdAttrTimeoutTCP:
c.TimeoutTCP = time.Duration(native.Uint32(attr.Value)) * time.Second
case ipvsCmdAttrTimeoutTCPFin:
c.TimeoutTCPFin = time.Duration(native.Uint32(attr.Value)) * time.Second
case ipvsCmdAttrTimeoutUDP:
c.TimeoutUDP = time.Duration(native.Uint32(attr.Value)) * time.Second
}
}
return &c, nil
}
|
[
"func",
"(",
"i",
"*",
"Handle",
")",
"parseConfig",
"(",
"msg",
"[",
"]",
"byte",
")",
"(",
"*",
"Config",
",",
"error",
")",
"{",
"var",
"c",
"Config",
"\n",
"hdr",
":=",
"deserializeGenlMsg",
"(",
"msg",
")",
"\n",
"attrs",
",",
"err",
":=",
"nl",
".",
"ParseRouteAttr",
"(",
"msg",
"[",
"hdr",
".",
"Len",
"(",
")",
":",
"]",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"for",
"_",
",",
"attr",
":=",
"range",
"attrs",
"{",
"attrType",
":=",
"int",
"(",
"attr",
".",
"Attr",
".",
"Type",
")",
"\n",
"switch",
"attrType",
"{",
"case",
"ipvsCmdAttrTimeoutTCP",
":",
"c",
".",
"TimeoutTCP",
"=",
"time",
".",
"Duration",
"(",
"native",
".",
"Uint32",
"(",
"attr",
".",
"Value",
")",
")",
"*",
"time",
".",
"Second",
"\n",
"case",
"ipvsCmdAttrTimeoutTCPFin",
":",
"c",
".",
"TimeoutTCPFin",
"=",
"time",
".",
"Duration",
"(",
"native",
".",
"Uint32",
"(",
"attr",
".",
"Value",
")",
")",
"*",
"time",
".",
"Second",
"\n",
"case",
"ipvsCmdAttrTimeoutUDP",
":",
"c",
".",
"TimeoutUDP",
"=",
"time",
".",
"Duration",
"(",
"native",
".",
"Uint32",
"(",
"attr",
".",
"Value",
")",
")",
"*",
"time",
".",
"Second",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"&",
"c",
",",
"nil",
"\n",
"}"
] |
// parseConfig given a ipvs netlink response this function will respond with a valid config entry, an error otherwise
|
[
"parseConfig",
"given",
"a",
"ipvs",
"netlink",
"response",
"this",
"function",
"will",
"respond",
"with",
"a",
"valid",
"config",
"entry",
"an",
"error",
"otherwise"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/netlink.go#L508-L531
|
train
|
docker/libnetwork
|
ipvs/netlink.go
|
doGetConfigCmd
|
func (i *Handle) doGetConfigCmd() (*Config, error) {
msg, err := i.doCmdWithoutAttr(ipvsCmdGetConfig)
if err != nil {
return nil, err
}
res, err := i.parseConfig(msg[0])
if err != nil {
return res, err
}
return res, nil
}
|
go
|
func (i *Handle) doGetConfigCmd() (*Config, error) {
msg, err := i.doCmdWithoutAttr(ipvsCmdGetConfig)
if err != nil {
return nil, err
}
res, err := i.parseConfig(msg[0])
if err != nil {
return res, err
}
return res, nil
}
|
[
"func",
"(",
"i",
"*",
"Handle",
")",
"doGetConfigCmd",
"(",
")",
"(",
"*",
"Config",
",",
"error",
")",
"{",
"msg",
",",
"err",
":=",
"i",
".",
"doCmdWithoutAttr",
"(",
"ipvsCmdGetConfig",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"res",
",",
"err",
":=",
"i",
".",
"parseConfig",
"(",
"msg",
"[",
"0",
"]",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n",
"return",
"res",
",",
"nil",
"\n",
"}"
] |
// doGetConfigCmd a wrapper function to be used by GetConfig
|
[
"doGetConfigCmd",
"a",
"wrapper",
"function",
"to",
"be",
"used",
"by",
"GetConfig"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/netlink.go#L534-L545
|
train
|
docker/libnetwork
|
ipvs/netlink.go
|
doSetConfigCmd
|
func (i *Handle) doSetConfigCmd(c *Config) error {
req := newIPVSRequest(ipvsCmdSetConfig)
req.Seq = atomic.AddUint32(&i.seq, 1)
req.AddData(nl.NewRtAttr(ipvsCmdAttrTimeoutTCP, nl.Uint32Attr(uint32(c.TimeoutTCP.Seconds()))))
req.AddData(nl.NewRtAttr(ipvsCmdAttrTimeoutTCPFin, nl.Uint32Attr(uint32(c.TimeoutTCPFin.Seconds()))))
req.AddData(nl.NewRtAttr(ipvsCmdAttrTimeoutUDP, nl.Uint32Attr(uint32(c.TimeoutUDP.Seconds()))))
_, err := execute(i.sock, req, 0)
return err
}
|
go
|
func (i *Handle) doSetConfigCmd(c *Config) error {
req := newIPVSRequest(ipvsCmdSetConfig)
req.Seq = atomic.AddUint32(&i.seq, 1)
req.AddData(nl.NewRtAttr(ipvsCmdAttrTimeoutTCP, nl.Uint32Attr(uint32(c.TimeoutTCP.Seconds()))))
req.AddData(nl.NewRtAttr(ipvsCmdAttrTimeoutTCPFin, nl.Uint32Attr(uint32(c.TimeoutTCPFin.Seconds()))))
req.AddData(nl.NewRtAttr(ipvsCmdAttrTimeoutUDP, nl.Uint32Attr(uint32(c.TimeoutUDP.Seconds()))))
_, err := execute(i.sock, req, 0)
return err
}
|
[
"func",
"(",
"i",
"*",
"Handle",
")",
"doSetConfigCmd",
"(",
"c",
"*",
"Config",
")",
"error",
"{",
"req",
":=",
"newIPVSRequest",
"(",
"ipvsCmdSetConfig",
")",
"\n",
"req",
".",
"Seq",
"=",
"atomic",
".",
"AddUint32",
"(",
"&",
"i",
".",
"seq",
",",
"1",
")",
"\n",
"req",
".",
"AddData",
"(",
"nl",
".",
"NewRtAttr",
"(",
"ipvsCmdAttrTimeoutTCP",
",",
"nl",
".",
"Uint32Attr",
"(",
"uint32",
"(",
"c",
".",
"TimeoutTCP",
".",
"Seconds",
"(",
")",
")",
")",
")",
")",
"\n",
"req",
".",
"AddData",
"(",
"nl",
".",
"NewRtAttr",
"(",
"ipvsCmdAttrTimeoutTCPFin",
",",
"nl",
".",
"Uint32Attr",
"(",
"uint32",
"(",
"c",
".",
"TimeoutTCPFin",
".",
"Seconds",
"(",
")",
")",
")",
")",
")",
"\n",
"req",
".",
"AddData",
"(",
"nl",
".",
"NewRtAttr",
"(",
"ipvsCmdAttrTimeoutUDP",
",",
"nl",
".",
"Uint32Attr",
"(",
"uint32",
"(",
"c",
".",
"TimeoutUDP",
".",
"Seconds",
"(",
")",
")",
")",
")",
")",
"\n",
"_",
",",
"err",
":=",
"execute",
"(",
"i",
".",
"sock",
",",
"req",
",",
"0",
")",
"\n",
"return",
"err",
"\n",
"}"
] |
// doSetConfigCmd a wrapper function to be used by SetConfig
|
[
"doSetConfigCmd",
"a",
"wrapper",
"function",
"to",
"be",
"used",
"by",
"SetConfig"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/netlink.go#L548-L559
|
train
|
docker/libnetwork
|
drivers/bridge/setup_device.go
|
setupDeviceUp
|
func setupDeviceUp(config *networkConfiguration, i *bridgeInterface) error {
err := i.nlh.LinkSetUp(i.Link)
if err != nil {
return fmt.Errorf("Failed to set link up for %s: %v", config.BridgeName, err)
}
// Attempt to update the bridge interface to refresh the flags status,
// ignoring any failure to do so.
if lnk, err := i.nlh.LinkByName(config.BridgeName); err == nil {
i.Link = lnk
} else {
logrus.Warnf("Failed to retrieve link for interface (%s): %v", config.BridgeName, err)
}
return nil
}
|
go
|
func setupDeviceUp(config *networkConfiguration, i *bridgeInterface) error {
err := i.nlh.LinkSetUp(i.Link)
if err != nil {
return fmt.Errorf("Failed to set link up for %s: %v", config.BridgeName, err)
}
// Attempt to update the bridge interface to refresh the flags status,
// ignoring any failure to do so.
if lnk, err := i.nlh.LinkByName(config.BridgeName); err == nil {
i.Link = lnk
} else {
logrus.Warnf("Failed to retrieve link for interface (%s): %v", config.BridgeName, err)
}
return nil
}
|
[
"func",
"setupDeviceUp",
"(",
"config",
"*",
"networkConfiguration",
",",
"i",
"*",
"bridgeInterface",
")",
"error",
"{",
"err",
":=",
"i",
".",
"nlh",
".",
"LinkSetUp",
"(",
"i",
".",
"Link",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"Failed to set link up for %s: %v\"",
",",
"config",
".",
"BridgeName",
",",
"err",
")",
"\n",
"}",
"\n",
"if",
"lnk",
",",
"err",
":=",
"i",
".",
"nlh",
".",
"LinkByName",
"(",
"config",
".",
"BridgeName",
")",
";",
"err",
"==",
"nil",
"{",
"i",
".",
"Link",
"=",
"lnk",
"\n",
"}",
"else",
"{",
"logrus",
".",
"Warnf",
"(",
"\"Failed to retrieve link for interface (%s): %v\"",
",",
"config",
".",
"BridgeName",
",",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] |
// SetupDeviceUp ups the given bridge interface.
|
[
"SetupDeviceUp",
"ups",
"the",
"given",
"bridge",
"interface",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/bridge/setup_device.go#L54-L68
|
train
|
docker/libnetwork
|
portallocator/portallocator.go
|
Error
|
func (e ErrPortAlreadyAllocated) Error() string {
return fmt.Sprintf("Bind for %s:%d failed: port is already allocated", e.ip, e.port)
}
|
go
|
func (e ErrPortAlreadyAllocated) Error() string {
return fmt.Sprintf("Bind for %s:%d failed: port is already allocated", e.ip, e.port)
}
|
[
"func",
"(",
"e",
"ErrPortAlreadyAllocated",
")",
"Error",
"(",
")",
"string",
"{",
"return",
"fmt",
".",
"Sprintf",
"(",
"\"Bind for %s:%d failed: port is already allocated\"",
",",
"e",
".",
"ip",
",",
"e",
".",
"port",
")",
"\n",
"}"
] |
// Error is the implementation of error.Error interface
|
[
"Error",
"is",
"the",
"implementation",
"of",
"error",
".",
"Error",
"interface"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/portallocator/portallocator.go#L59-L61
|
train
|
docker/libnetwork
|
portallocator/portallocator.go
|
RequestPort
|
func (p *PortAllocator) RequestPort(ip net.IP, proto string, port int) (int, error) {
return p.RequestPortInRange(ip, proto, port, port)
}
|
go
|
func (p *PortAllocator) RequestPort(ip net.IP, proto string, port int) (int, error) {
return p.RequestPortInRange(ip, proto, port, port)
}
|
[
"func",
"(",
"p",
"*",
"PortAllocator",
")",
"RequestPort",
"(",
"ip",
"net",
".",
"IP",
",",
"proto",
"string",
",",
"port",
"int",
")",
"(",
"int",
",",
"error",
")",
"{",
"return",
"p",
".",
"RequestPortInRange",
"(",
"ip",
",",
"proto",
",",
"port",
",",
"port",
")",
"\n",
"}"
] |
// RequestPort requests new port from global ports pool for specified ip and proto.
// If port is 0 it returns first free port. Otherwise it checks port availability
// in proto's pool and returns that port or error if port is already busy.
|
[
"RequestPort",
"requests",
"new",
"port",
"from",
"global",
"ports",
"pool",
"for",
"specified",
"ip",
"and",
"proto",
".",
"If",
"port",
"is",
"0",
"it",
"returns",
"first",
"free",
"port",
".",
"Otherwise",
"it",
"checks",
"port",
"availability",
"in",
"proto",
"s",
"pool",
"and",
"returns",
"that",
"port",
"or",
"error",
"if",
"port",
"is",
"already",
"busy",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/portallocator/portallocator.go#L110-L112
|
train
|
docker/libnetwork
|
portallocator/portallocator.go
|
ReleasePort
|
func (p *PortAllocator) ReleasePort(ip net.IP, proto string, port int) error {
p.mutex.Lock()
defer p.mutex.Unlock()
if ip == nil {
ip = defaultIP
}
protomap, ok := p.ipMap[ip.String()]
if !ok {
return nil
}
delete(protomap[proto].p, port)
return nil
}
|
go
|
func (p *PortAllocator) ReleasePort(ip net.IP, proto string, port int) error {
p.mutex.Lock()
defer p.mutex.Unlock()
if ip == nil {
ip = defaultIP
}
protomap, ok := p.ipMap[ip.String()]
if !ok {
return nil
}
delete(protomap[proto].p, port)
return nil
}
|
[
"func",
"(",
"p",
"*",
"PortAllocator",
")",
"ReleasePort",
"(",
"ip",
"net",
".",
"IP",
",",
"proto",
"string",
",",
"port",
"int",
")",
"error",
"{",
"p",
".",
"mutex",
".",
"Lock",
"(",
")",
"\n",
"defer",
"p",
".",
"mutex",
".",
"Unlock",
"(",
")",
"\n",
"if",
"ip",
"==",
"nil",
"{",
"ip",
"=",
"defaultIP",
"\n",
"}",
"\n",
"protomap",
",",
"ok",
":=",
"p",
".",
"ipMap",
"[",
"ip",
".",
"String",
"(",
")",
"]",
"\n",
"if",
"!",
"ok",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"delete",
"(",
"protomap",
"[",
"proto",
"]",
".",
"p",
",",
"port",
")",
"\n",
"return",
"nil",
"\n",
"}"
] |
// ReleasePort releases port from global ports pool for specified ip and proto.
|
[
"ReleasePort",
"releases",
"port",
"from",
"global",
"ports",
"pool",
"for",
"specified",
"ip",
"and",
"proto",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/portallocator/portallocator.go#L158-L171
|
train
|
docker/libnetwork
|
portallocator/portallocator.go
|
ReleaseAll
|
func (p *PortAllocator) ReleaseAll() error {
p.mutex.Lock()
p.ipMap = ipMapping{}
p.mutex.Unlock()
return nil
}
|
go
|
func (p *PortAllocator) ReleaseAll() error {
p.mutex.Lock()
p.ipMap = ipMapping{}
p.mutex.Unlock()
return nil
}
|
[
"func",
"(",
"p",
"*",
"PortAllocator",
")",
"ReleaseAll",
"(",
")",
"error",
"{",
"p",
".",
"mutex",
".",
"Lock",
"(",
")",
"\n",
"p",
".",
"ipMap",
"=",
"ipMapping",
"{",
"}",
"\n",
"p",
".",
"mutex",
".",
"Unlock",
"(",
")",
"\n",
"return",
"nil",
"\n",
"}"
] |
// ReleaseAll releases all ports for all ips.
|
[
"ReleaseAll",
"releases",
"all",
"ports",
"for",
"all",
"ips",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/portallocator/portallocator.go#L186-L191
|
train
|
docker/libnetwork
|
drivers/macvlan/macvlan_setup.go
|
createMacVlan
|
func createMacVlan(containerIfName, parent, macvlanMode string) (string, error) {
// Set the macvlan mode. Default is bridge mode
mode, err := setMacVlanMode(macvlanMode)
if err != nil {
return "", fmt.Errorf("Unsupported %s macvlan mode: %v", macvlanMode, err)
}
// verify the Docker host interface acting as the macvlan parent iface exists
if !parentExists(parent) {
return "", fmt.Errorf("the requested parent interface %s was not found on the Docker host", parent)
}
// Get the link for the master index (Example: the docker host eth iface)
parentLink, err := ns.NlHandle().LinkByName(parent)
if err != nil {
return "", fmt.Errorf("error occurred looking up the %s parent iface %s error: %s", macvlanType, parent, err)
}
// Create a macvlan link
macvlan := &netlink.Macvlan{
LinkAttrs: netlink.LinkAttrs{
Name: containerIfName,
ParentIndex: parentLink.Attrs().Index,
},
Mode: mode,
}
if err := ns.NlHandle().LinkAdd(macvlan); err != nil {
// If a user creates a macvlan and ipvlan on same parent, only one slave iface can be active at a time.
return "", fmt.Errorf("failed to create the %s port: %v", macvlanType, err)
}
return macvlan.Attrs().Name, nil
}
|
go
|
func createMacVlan(containerIfName, parent, macvlanMode string) (string, error) {
// Set the macvlan mode. Default is bridge mode
mode, err := setMacVlanMode(macvlanMode)
if err != nil {
return "", fmt.Errorf("Unsupported %s macvlan mode: %v", macvlanMode, err)
}
// verify the Docker host interface acting as the macvlan parent iface exists
if !parentExists(parent) {
return "", fmt.Errorf("the requested parent interface %s was not found on the Docker host", parent)
}
// Get the link for the master index (Example: the docker host eth iface)
parentLink, err := ns.NlHandle().LinkByName(parent)
if err != nil {
return "", fmt.Errorf("error occurred looking up the %s parent iface %s error: %s", macvlanType, parent, err)
}
// Create a macvlan link
macvlan := &netlink.Macvlan{
LinkAttrs: netlink.LinkAttrs{
Name: containerIfName,
ParentIndex: parentLink.Attrs().Index,
},
Mode: mode,
}
if err := ns.NlHandle().LinkAdd(macvlan); err != nil {
// If a user creates a macvlan and ipvlan on same parent, only one slave iface can be active at a time.
return "", fmt.Errorf("failed to create the %s port: %v", macvlanType, err)
}
return macvlan.Attrs().Name, nil
}
|
[
"func",
"createMacVlan",
"(",
"containerIfName",
",",
"parent",
",",
"macvlanMode",
"string",
")",
"(",
"string",
",",
"error",
")",
"{",
"mode",
",",
"err",
":=",
"setMacVlanMode",
"(",
"macvlanMode",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"\"",
",",
"fmt",
".",
"Errorf",
"(",
"\"Unsupported %s macvlan mode: %v\"",
",",
"macvlanMode",
",",
"err",
")",
"\n",
"}",
"\n",
"if",
"!",
"parentExists",
"(",
"parent",
")",
"{",
"return",
"\"\"",
",",
"fmt",
".",
"Errorf",
"(",
"\"the requested parent interface %s was not found on the Docker host\"",
",",
"parent",
")",
"\n",
"}",
"\n",
"parentLink",
",",
"err",
":=",
"ns",
".",
"NlHandle",
"(",
")",
".",
"LinkByName",
"(",
"parent",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"\"",
",",
"fmt",
".",
"Errorf",
"(",
"\"error occurred looking up the %s parent iface %s error: %s\"",
",",
"macvlanType",
",",
"parent",
",",
"err",
")",
"\n",
"}",
"\n",
"macvlan",
":=",
"&",
"netlink",
".",
"Macvlan",
"{",
"LinkAttrs",
":",
"netlink",
".",
"LinkAttrs",
"{",
"Name",
":",
"containerIfName",
",",
"ParentIndex",
":",
"parentLink",
".",
"Attrs",
"(",
")",
".",
"Index",
",",
"}",
",",
"Mode",
":",
"mode",
",",
"}",
"\n",
"if",
"err",
":=",
"ns",
".",
"NlHandle",
"(",
")",
".",
"LinkAdd",
"(",
"macvlan",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"\"\"",
",",
"fmt",
".",
"Errorf",
"(",
"\"failed to create the %s port: %v\"",
",",
"macvlanType",
",",
"err",
")",
"\n",
"}",
"\n",
"return",
"macvlan",
".",
"Attrs",
"(",
")",
".",
"Name",
",",
"nil",
"\n",
"}"
] |
// Create the macvlan slave specifying the source name
|
[
"Create",
"the",
"macvlan",
"slave",
"specifying",
"the",
"source",
"name"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/macvlan/macvlan_setup.go#L20-L49
|
train
|
docker/libnetwork
|
drivers/macvlan/macvlan_setup.go
|
setMacVlanMode
|
func setMacVlanMode(mode string) (netlink.MacvlanMode, error) {
switch mode {
case modePrivate:
return netlink.MACVLAN_MODE_PRIVATE, nil
case modeVepa:
return netlink.MACVLAN_MODE_VEPA, nil
case modeBridge:
return netlink.MACVLAN_MODE_BRIDGE, nil
case modePassthru:
return netlink.MACVLAN_MODE_PASSTHRU, nil
default:
return 0, fmt.Errorf("unknown macvlan mode: %s", mode)
}
}
|
go
|
func setMacVlanMode(mode string) (netlink.MacvlanMode, error) {
switch mode {
case modePrivate:
return netlink.MACVLAN_MODE_PRIVATE, nil
case modeVepa:
return netlink.MACVLAN_MODE_VEPA, nil
case modeBridge:
return netlink.MACVLAN_MODE_BRIDGE, nil
case modePassthru:
return netlink.MACVLAN_MODE_PASSTHRU, nil
default:
return 0, fmt.Errorf("unknown macvlan mode: %s", mode)
}
}
|
[
"func",
"setMacVlanMode",
"(",
"mode",
"string",
")",
"(",
"netlink",
".",
"MacvlanMode",
",",
"error",
")",
"{",
"switch",
"mode",
"{",
"case",
"modePrivate",
":",
"return",
"netlink",
".",
"MACVLAN_MODE_PRIVATE",
",",
"nil",
"\n",
"case",
"modeVepa",
":",
"return",
"netlink",
".",
"MACVLAN_MODE_VEPA",
",",
"nil",
"\n",
"case",
"modeBridge",
":",
"return",
"netlink",
".",
"MACVLAN_MODE_BRIDGE",
",",
"nil",
"\n",
"case",
"modePassthru",
":",
"return",
"netlink",
".",
"MACVLAN_MODE_PASSTHRU",
",",
"nil",
"\n",
"default",
":",
"return",
"0",
",",
"fmt",
".",
"Errorf",
"(",
"\"unknown macvlan mode: %s\"",
",",
"mode",
")",
"\n",
"}",
"\n",
"}"
] |
// setMacVlanMode setter for one of the four macvlan port types
|
[
"setMacVlanMode",
"setter",
"for",
"one",
"of",
"the",
"four",
"macvlan",
"port",
"types"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/macvlan/macvlan_setup.go#L52-L65
|
train
|
docker/libnetwork
|
drivers/macvlan/macvlan_setup.go
|
delVlanLink
|
func delVlanLink(linkName string) error {
if strings.Contains(linkName, ".") {
_, _, err := parseVlan(linkName)
if err != nil {
return err
}
// delete the vlan subinterface
vlanLink, err := ns.NlHandle().LinkByName(linkName)
if err != nil {
return fmt.Errorf("failed to find interface %s on the Docker host : %v", linkName, err)
}
// verify a parent interface isn't being deleted
if vlanLink.Attrs().ParentIndex == 0 {
return fmt.Errorf("interface %s does not appear to be a slave device: %v", linkName, err)
}
// delete the macvlan slave device
if err := ns.NlHandle().LinkDel(vlanLink); err != nil {
return fmt.Errorf("failed to delete %s link: %v", linkName, err)
}
logrus.Debugf("Deleted a vlan tagged netlink subinterface: %s", linkName)
}
// if the subinterface doesn't parse to iface.vlan_id leave the interface in
// place since it could be a user specified name not created by the driver.
return nil
}
|
go
|
func delVlanLink(linkName string) error {
if strings.Contains(linkName, ".") {
_, _, err := parseVlan(linkName)
if err != nil {
return err
}
// delete the vlan subinterface
vlanLink, err := ns.NlHandle().LinkByName(linkName)
if err != nil {
return fmt.Errorf("failed to find interface %s on the Docker host : %v", linkName, err)
}
// verify a parent interface isn't being deleted
if vlanLink.Attrs().ParentIndex == 0 {
return fmt.Errorf("interface %s does not appear to be a slave device: %v", linkName, err)
}
// delete the macvlan slave device
if err := ns.NlHandle().LinkDel(vlanLink); err != nil {
return fmt.Errorf("failed to delete %s link: %v", linkName, err)
}
logrus.Debugf("Deleted a vlan tagged netlink subinterface: %s", linkName)
}
// if the subinterface doesn't parse to iface.vlan_id leave the interface in
// place since it could be a user specified name not created by the driver.
return nil
}
|
[
"func",
"delVlanLink",
"(",
"linkName",
"string",
")",
"error",
"{",
"if",
"strings",
".",
"Contains",
"(",
"linkName",
",",
"\".\"",
")",
"{",
"_",
",",
"_",
",",
"err",
":=",
"parseVlan",
"(",
"linkName",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"vlanLink",
",",
"err",
":=",
"ns",
".",
"NlHandle",
"(",
")",
".",
"LinkByName",
"(",
"linkName",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"failed to find interface %s on the Docker host : %v\"",
",",
"linkName",
",",
"err",
")",
"\n",
"}",
"\n",
"if",
"vlanLink",
".",
"Attrs",
"(",
")",
".",
"ParentIndex",
"==",
"0",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"interface %s does not appear to be a slave device: %v\"",
",",
"linkName",
",",
"err",
")",
"\n",
"}",
"\n",
"if",
"err",
":=",
"ns",
".",
"NlHandle",
"(",
")",
".",
"LinkDel",
"(",
"vlanLink",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"failed to delete %s link: %v\"",
",",
"linkName",
",",
"err",
")",
"\n",
"}",
"\n",
"logrus",
".",
"Debugf",
"(",
"\"Deleted a vlan tagged netlink subinterface: %s\"",
",",
"linkName",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] |
// delVlanLink verifies only sub-interfaces with a vlan id get deleted
|
[
"delVlanLink",
"verifies",
"only",
"sub",
"-",
"interfaces",
"with",
"a",
"vlan",
"id",
"get",
"deleted"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/macvlan/macvlan_setup.go#L116-L140
|
train
|
docker/libnetwork
|
resolvconf/resolvconf.go
|
GetSpecific
|
func GetSpecific(path string) (*File, error) {
resolv, err := ioutil.ReadFile(path)
if err != nil {
return nil, err
}
hash, err := ioutils.HashData(bytes.NewReader(resolv))
if err != nil {
return nil, err
}
return &File{Content: resolv, Hash: hash}, nil
}
|
go
|
func GetSpecific(path string) (*File, error) {
resolv, err := ioutil.ReadFile(path)
if err != nil {
return nil, err
}
hash, err := ioutils.HashData(bytes.NewReader(resolv))
if err != nil {
return nil, err
}
return &File{Content: resolv, Hash: hash}, nil
}
|
[
"func",
"GetSpecific",
"(",
"path",
"string",
")",
"(",
"*",
"File",
",",
"error",
")",
"{",
"resolv",
",",
"err",
":=",
"ioutil",
".",
"ReadFile",
"(",
"path",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"hash",
",",
"err",
":=",
"ioutils",
".",
"HashData",
"(",
"bytes",
".",
"NewReader",
"(",
"resolv",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"&",
"File",
"{",
"Content",
":",
"resolv",
",",
"Hash",
":",
"hash",
"}",
",",
"nil",
"\n",
"}"
] |
// GetSpecific returns the contents of the user specified resolv.conf file and its hash
|
[
"GetSpecific",
"returns",
"the",
"contents",
"of",
"the",
"user",
"specified",
"resolv",
".",
"conf",
"file",
"and",
"its",
"hash"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/resolvconf/resolvconf.go#L62-L72
|
train
|
docker/libnetwork
|
resolvconf/resolvconf.go
|
GetLastModified
|
func GetLastModified() *File {
lastModified.Lock()
defer lastModified.Unlock()
return &File{Content: lastModified.contents, Hash: lastModified.sha256}
}
|
go
|
func GetLastModified() *File {
lastModified.Lock()
defer lastModified.Unlock()
return &File{Content: lastModified.contents, Hash: lastModified.sha256}
}
|
[
"func",
"GetLastModified",
"(",
")",
"*",
"File",
"{",
"lastModified",
".",
"Lock",
"(",
")",
"\n",
"defer",
"lastModified",
".",
"Unlock",
"(",
")",
"\n",
"return",
"&",
"File",
"{",
"Content",
":",
"lastModified",
".",
"contents",
",",
"Hash",
":",
"lastModified",
".",
"sha256",
"}",
"\n",
"}"
] |
// GetLastModified retrieves the last used contents and hash of the host resolv.conf.
// Used by containers updating on restart
|
[
"GetLastModified",
"retrieves",
"the",
"last",
"used",
"contents",
"and",
"hash",
"of",
"the",
"host",
"resolv",
".",
"conf",
".",
"Used",
"by",
"containers",
"updating",
"on",
"restart"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/resolvconf/resolvconf.go#L100-L105
|
train
|
docker/libnetwork
|
resolvconf/resolvconf.go
|
getLines
|
func getLines(input []byte, commentMarker []byte) [][]byte {
lines := bytes.Split(input, []byte("\n"))
var output [][]byte
for _, currentLine := range lines {
var commentIndex = bytes.Index(currentLine, commentMarker)
if commentIndex == -1 {
output = append(output, currentLine)
} else {
output = append(output, currentLine[:commentIndex])
}
}
return output
}
|
go
|
func getLines(input []byte, commentMarker []byte) [][]byte {
lines := bytes.Split(input, []byte("\n"))
var output [][]byte
for _, currentLine := range lines {
var commentIndex = bytes.Index(currentLine, commentMarker)
if commentIndex == -1 {
output = append(output, currentLine)
} else {
output = append(output, currentLine[:commentIndex])
}
}
return output
}
|
[
"func",
"getLines",
"(",
"input",
"[",
"]",
"byte",
",",
"commentMarker",
"[",
"]",
"byte",
")",
"[",
"]",
"[",
"]",
"byte",
"{",
"lines",
":=",
"bytes",
".",
"Split",
"(",
"input",
",",
"[",
"]",
"byte",
"(",
"\"\\n\"",
")",
")",
"\n",
"\\n",
"\n",
"var",
"output",
"[",
"]",
"[",
"]",
"byte",
"\n",
"for",
"_",
",",
"currentLine",
":=",
"range",
"lines",
"{",
"var",
"commentIndex",
"=",
"bytes",
".",
"Index",
"(",
"currentLine",
",",
"commentMarker",
")",
"\n",
"if",
"commentIndex",
"==",
"-",
"1",
"{",
"output",
"=",
"append",
"(",
"output",
",",
"currentLine",
")",
"\n",
"}",
"else",
"{",
"output",
"=",
"append",
"(",
"output",
",",
"currentLine",
"[",
":",
"commentIndex",
"]",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] |
// getLines parses input into lines and strips away comments.
|
[
"getLines",
"parses",
"input",
"into",
"lines",
"and",
"strips",
"away",
"comments",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/resolvconf/resolvconf.go#L139-L151
|
train
|
docker/libnetwork
|
resolvconf/resolvconf.go
|
Build
|
func Build(path string, dns, dnsSearch, dnsOptions []string) (*File, error) {
content := bytes.NewBuffer(nil)
if len(dnsSearch) > 0 {
if searchString := strings.Join(dnsSearch, " "); strings.Trim(searchString, " ") != "." {
if _, err := content.WriteString("search " + searchString + "\n"); err != nil {
return nil, err
}
}
}
for _, dns := range dns {
if _, err := content.WriteString("nameserver " + dns + "\n"); err != nil {
return nil, err
}
}
if len(dnsOptions) > 0 {
if optsString := strings.Join(dnsOptions, " "); strings.Trim(optsString, " ") != "" {
if _, err := content.WriteString("options " + optsString + "\n"); err != nil {
return nil, err
}
}
}
hash, err := ioutils.HashData(bytes.NewReader(content.Bytes()))
if err != nil {
return nil, err
}
return &File{Content: content.Bytes(), Hash: hash}, ioutil.WriteFile(path, content.Bytes(), 0644)
}
|
go
|
func Build(path string, dns, dnsSearch, dnsOptions []string) (*File, error) {
content := bytes.NewBuffer(nil)
if len(dnsSearch) > 0 {
if searchString := strings.Join(dnsSearch, " "); strings.Trim(searchString, " ") != "." {
if _, err := content.WriteString("search " + searchString + "\n"); err != nil {
return nil, err
}
}
}
for _, dns := range dns {
if _, err := content.WriteString("nameserver " + dns + "\n"); err != nil {
return nil, err
}
}
if len(dnsOptions) > 0 {
if optsString := strings.Join(dnsOptions, " "); strings.Trim(optsString, " ") != "" {
if _, err := content.WriteString("options " + optsString + "\n"); err != nil {
return nil, err
}
}
}
hash, err := ioutils.HashData(bytes.NewReader(content.Bytes()))
if err != nil {
return nil, err
}
return &File{Content: content.Bytes(), Hash: hash}, ioutil.WriteFile(path, content.Bytes(), 0644)
}
|
[
"func",
"Build",
"(",
"path",
"string",
",",
"dns",
",",
"dnsSearch",
",",
"dnsOptions",
"[",
"]",
"string",
")",
"(",
"*",
"File",
",",
"error",
")",
"{",
"content",
":=",
"bytes",
".",
"NewBuffer",
"(",
"nil",
")",
"\n",
"if",
"len",
"(",
"dnsSearch",
")",
">",
"0",
"{",
"if",
"searchString",
":=",
"strings",
".",
"Join",
"(",
"dnsSearch",
",",
"\" \"",
")",
";",
"strings",
".",
"Trim",
"(",
"searchString",
",",
"\" \"",
")",
"!=",
"\".\"",
"{",
"if",
"_",
",",
"err",
":=",
"content",
".",
"WriteString",
"(",
"\"search \"",
"+",
"searchString",
"+",
"\"\\n\"",
")",
";",
"\\n",
"err",
"!=",
"nil",
"\n",
"}",
"\n",
"}",
"\n",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"for",
"_",
",",
"dns",
":=",
"range",
"dns",
"{",
"if",
"_",
",",
"err",
":=",
"content",
".",
"WriteString",
"(",
"\"nameserver \"",
"+",
"dns",
"+",
"\"\\n\"",
")",
";",
"\\n",
"err",
"!=",
"nil",
"\n",
"}",
"\n",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"len",
"(",
"dnsOptions",
")",
">",
"0",
"{",
"if",
"optsString",
":=",
"strings",
".",
"Join",
"(",
"dnsOptions",
",",
"\" \"",
")",
";",
"strings",
".",
"Trim",
"(",
"optsString",
",",
"\" \"",
")",
"!=",
"\"\"",
"{",
"if",
"_",
",",
"err",
":=",
"content",
".",
"WriteString",
"(",
"\"options \"",
"+",
"optsString",
"+",
"\"\\n\"",
")",
";",
"\\n",
"err",
"!=",
"nil",
"\n",
"}",
"\n",
"}",
"\n",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}"
] |
// Build writes a configuration file to path containing a "nameserver" entry
// for every element in dns, a "search" entry for every element in
// dnsSearch, and an "options" entry for every element in dnsOptions.
|
[
"Build",
"writes",
"a",
"configuration",
"file",
"to",
"path",
"containing",
"a",
"nameserver",
"entry",
"for",
"every",
"element",
"in",
"dns",
"a",
"search",
"entry",
"for",
"every",
"element",
"in",
"dnsSearch",
"and",
"an",
"options",
"entry",
"for",
"every",
"element",
"in",
"dnsOptions",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/resolvconf/resolvconf.go#L223-L251
|
train
|
docker/libnetwork
|
ipam/allocator.go
|
NewAllocator
|
func NewAllocator(lcDs, glDs datastore.DataStore) (*Allocator, error) {
a := &Allocator{}
// Load predefined subnet pools
a.predefined = map[string][]*net.IPNet{
localAddressSpace: ipamutils.GetLocalScopeDefaultNetworks(),
globalAddressSpace: ipamutils.GetGlobalScopeDefaultNetworks(),
}
// Initialize asIndices map
a.predefinedStartIndices = make(map[string]int)
// Initialize bitseq map
a.addresses = make(map[SubnetKey]*bitseq.Handle)
// Initialize address spaces
a.addrSpaces = make(map[string]*addrSpace)
for _, aspc := range []struct {
as string
ds datastore.DataStore
}{
{localAddressSpace, lcDs},
{globalAddressSpace, glDs},
} {
a.initializeAddressSpace(aspc.as, aspc.ds)
}
return a, nil
}
|
go
|
func NewAllocator(lcDs, glDs datastore.DataStore) (*Allocator, error) {
a := &Allocator{}
// Load predefined subnet pools
a.predefined = map[string][]*net.IPNet{
localAddressSpace: ipamutils.GetLocalScopeDefaultNetworks(),
globalAddressSpace: ipamutils.GetGlobalScopeDefaultNetworks(),
}
// Initialize asIndices map
a.predefinedStartIndices = make(map[string]int)
// Initialize bitseq map
a.addresses = make(map[SubnetKey]*bitseq.Handle)
// Initialize address spaces
a.addrSpaces = make(map[string]*addrSpace)
for _, aspc := range []struct {
as string
ds datastore.DataStore
}{
{localAddressSpace, lcDs},
{globalAddressSpace, glDs},
} {
a.initializeAddressSpace(aspc.as, aspc.ds)
}
return a, nil
}
|
[
"func",
"NewAllocator",
"(",
"lcDs",
",",
"glDs",
"datastore",
".",
"DataStore",
")",
"(",
"*",
"Allocator",
",",
"error",
")",
"{",
"a",
":=",
"&",
"Allocator",
"{",
"}",
"\n",
"a",
".",
"predefined",
"=",
"map",
"[",
"string",
"]",
"[",
"]",
"*",
"net",
".",
"IPNet",
"{",
"localAddressSpace",
":",
"ipamutils",
".",
"GetLocalScopeDefaultNetworks",
"(",
")",
",",
"globalAddressSpace",
":",
"ipamutils",
".",
"GetGlobalScopeDefaultNetworks",
"(",
")",
",",
"}",
"\n",
"a",
".",
"predefinedStartIndices",
"=",
"make",
"(",
"map",
"[",
"string",
"]",
"int",
")",
"\n",
"a",
".",
"addresses",
"=",
"make",
"(",
"map",
"[",
"SubnetKey",
"]",
"*",
"bitseq",
".",
"Handle",
")",
"\n",
"a",
".",
"addrSpaces",
"=",
"make",
"(",
"map",
"[",
"string",
"]",
"*",
"addrSpace",
")",
"\n",
"for",
"_",
",",
"aspc",
":=",
"range",
"[",
"]",
"struct",
"{",
"as",
"string",
"\n",
"ds",
"datastore",
".",
"DataStore",
"\n",
"}",
"{",
"{",
"localAddressSpace",
",",
"lcDs",
"}",
",",
"{",
"globalAddressSpace",
",",
"glDs",
"}",
",",
"}",
"{",
"a",
".",
"initializeAddressSpace",
"(",
"aspc",
".",
"as",
",",
"aspc",
".",
"ds",
")",
"\n",
"}",
"\n",
"return",
"a",
",",
"nil",
"\n",
"}"
] |
// NewAllocator returns an instance of libnetwork ipam
|
[
"NewAllocator",
"returns",
"an",
"instance",
"of",
"libnetwork",
"ipam"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipam/allocator.go#L44-L73
|
train
|
docker/libnetwork
|
ipam/allocator.go
|
checkConsistency
|
func (a *Allocator) checkConsistency(as string) {
var sKeyList []SubnetKey
// Retrieve this address space's configuration and bitmasks from the datastore
a.refresh(as)
a.Lock()
aSpace, ok := a.addrSpaces[as]
a.Unlock()
if !ok {
return
}
a.updateBitMasks(aSpace)
aSpace.Lock()
for sk, pd := range aSpace.subnets {
if pd.Range != nil {
continue
}
sKeyList = append(sKeyList, sk)
}
aSpace.Unlock()
for _, sk := range sKeyList {
a.Lock()
bm := a.addresses[sk]
a.Unlock()
if err := bm.CheckConsistency(); err != nil {
logrus.Warnf("Error while running consistency check for %s: %v", sk, err)
}
}
}
|
go
|
func (a *Allocator) checkConsistency(as string) {
var sKeyList []SubnetKey
// Retrieve this address space's configuration and bitmasks from the datastore
a.refresh(as)
a.Lock()
aSpace, ok := a.addrSpaces[as]
a.Unlock()
if !ok {
return
}
a.updateBitMasks(aSpace)
aSpace.Lock()
for sk, pd := range aSpace.subnets {
if pd.Range != nil {
continue
}
sKeyList = append(sKeyList, sk)
}
aSpace.Unlock()
for _, sk := range sKeyList {
a.Lock()
bm := a.addresses[sk]
a.Unlock()
if err := bm.CheckConsistency(); err != nil {
logrus.Warnf("Error while running consistency check for %s: %v", sk, err)
}
}
}
|
[
"func",
"(",
"a",
"*",
"Allocator",
")",
"checkConsistency",
"(",
"as",
"string",
")",
"{",
"var",
"sKeyList",
"[",
"]",
"SubnetKey",
"\n",
"a",
".",
"refresh",
"(",
"as",
")",
"\n",
"a",
".",
"Lock",
"(",
")",
"\n",
"aSpace",
",",
"ok",
":=",
"a",
".",
"addrSpaces",
"[",
"as",
"]",
"\n",
"a",
".",
"Unlock",
"(",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"\n",
"}",
"\n",
"a",
".",
"updateBitMasks",
"(",
"aSpace",
")",
"\n",
"aSpace",
".",
"Lock",
"(",
")",
"\n",
"for",
"sk",
",",
"pd",
":=",
"range",
"aSpace",
".",
"subnets",
"{",
"if",
"pd",
".",
"Range",
"!=",
"nil",
"{",
"continue",
"\n",
"}",
"\n",
"sKeyList",
"=",
"append",
"(",
"sKeyList",
",",
"sk",
")",
"\n",
"}",
"\n",
"aSpace",
".",
"Unlock",
"(",
")",
"\n",
"for",
"_",
",",
"sk",
":=",
"range",
"sKeyList",
"{",
"a",
".",
"Lock",
"(",
")",
"\n",
"bm",
":=",
"a",
".",
"addresses",
"[",
"sk",
"]",
"\n",
"a",
".",
"Unlock",
"(",
")",
"\n",
"if",
"err",
":=",
"bm",
".",
"CheckConsistency",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Warnf",
"(",
"\"Error while running consistency check for %s: %v\"",
",",
"sk",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] |
// Checks for and fixes damaged bitmask.
|
[
"Checks",
"for",
"and",
"fixes",
"damaged",
"bitmask",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipam/allocator.go#L118-L148
|
train
|
docker/libnetwork
|
ipam/allocator.go
|
DiscoverNew
|
func (a *Allocator) DiscoverNew(dType discoverapi.DiscoveryType, data interface{}) error {
if dType != discoverapi.DatastoreConfig {
return nil
}
dsc, ok := data.(discoverapi.DatastoreConfigData)
if !ok {
return types.InternalErrorf("incorrect data in datastore update notification: %v", data)
}
ds, err := datastore.NewDataStoreFromConfig(dsc)
if err != nil {
return err
}
return a.initializeAddressSpace(globalAddressSpace, ds)
}
|
go
|
func (a *Allocator) DiscoverNew(dType discoverapi.DiscoveryType, data interface{}) error {
if dType != discoverapi.DatastoreConfig {
return nil
}
dsc, ok := data.(discoverapi.DatastoreConfigData)
if !ok {
return types.InternalErrorf("incorrect data in datastore update notification: %v", data)
}
ds, err := datastore.NewDataStoreFromConfig(dsc)
if err != nil {
return err
}
return a.initializeAddressSpace(globalAddressSpace, ds)
}
|
[
"func",
"(",
"a",
"*",
"Allocator",
")",
"DiscoverNew",
"(",
"dType",
"discoverapi",
".",
"DiscoveryType",
",",
"data",
"interface",
"{",
"}",
")",
"error",
"{",
"if",
"dType",
"!=",
"discoverapi",
".",
"DatastoreConfig",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"dsc",
",",
"ok",
":=",
"data",
".",
"(",
"discoverapi",
".",
"DatastoreConfigData",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"types",
".",
"InternalErrorf",
"(",
"\"incorrect data in datastore update notification: %v\"",
",",
"data",
")",
"\n",
"}",
"\n",
"ds",
",",
"err",
":=",
"datastore",
".",
"NewDataStoreFromConfig",
"(",
"dsc",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"return",
"a",
".",
"initializeAddressSpace",
"(",
"globalAddressSpace",
",",
"ds",
")",
"\n",
"}"
] |
// DiscoverNew informs the allocator about a new global scope datastore
|
[
"DiscoverNew",
"informs",
"the",
"allocator",
"about",
"a",
"new",
"global",
"scope",
"datastore"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipam/allocator.go#L178-L194
|
train
|
docker/libnetwork
|
ipam/allocator.go
|
RequestPool
|
func (a *Allocator) RequestPool(addressSpace, pool, subPool string, options map[string]string, v6 bool) (string, *net.IPNet, map[string]string, error) {
logrus.Debugf("RequestPool(%s, %s, %s, %v, %t)", addressSpace, pool, subPool, options, v6)
k, nw, ipr, err := a.parsePoolRequest(addressSpace, pool, subPool, v6)
if err != nil {
return "", nil, nil, types.InternalErrorf("failed to parse pool request for address space %q pool %q subpool %q: %v", addressSpace, pool, subPool, err)
}
pdf := k == nil
retry:
if pdf {
if nw, err = a.getPredefinedPool(addressSpace, v6); err != nil {
return "", nil, nil, err
}
k = &SubnetKey{AddressSpace: addressSpace, Subnet: nw.String()}
}
if err := a.refresh(addressSpace); err != nil {
return "", nil, nil, err
}
aSpace, err := a.getAddrSpace(addressSpace)
if err != nil {
return "", nil, nil, err
}
insert, err := aSpace.updatePoolDBOnAdd(*k, nw, ipr, pdf)
if err != nil {
if _, ok := err.(types.MaskableError); ok {
logrus.Debugf("Retrying predefined pool search: %v", err)
goto retry
}
return "", nil, nil, err
}
if err := a.writeToStore(aSpace); err != nil {
if _, ok := err.(types.RetryError); !ok {
return "", nil, nil, types.InternalErrorf("pool configuration failed because of %s", err.Error())
}
goto retry
}
return k.String(), nw, nil, insert()
}
|
go
|
func (a *Allocator) RequestPool(addressSpace, pool, subPool string, options map[string]string, v6 bool) (string, *net.IPNet, map[string]string, error) {
logrus.Debugf("RequestPool(%s, %s, %s, %v, %t)", addressSpace, pool, subPool, options, v6)
k, nw, ipr, err := a.parsePoolRequest(addressSpace, pool, subPool, v6)
if err != nil {
return "", nil, nil, types.InternalErrorf("failed to parse pool request for address space %q pool %q subpool %q: %v", addressSpace, pool, subPool, err)
}
pdf := k == nil
retry:
if pdf {
if nw, err = a.getPredefinedPool(addressSpace, v6); err != nil {
return "", nil, nil, err
}
k = &SubnetKey{AddressSpace: addressSpace, Subnet: nw.String()}
}
if err := a.refresh(addressSpace); err != nil {
return "", nil, nil, err
}
aSpace, err := a.getAddrSpace(addressSpace)
if err != nil {
return "", nil, nil, err
}
insert, err := aSpace.updatePoolDBOnAdd(*k, nw, ipr, pdf)
if err != nil {
if _, ok := err.(types.MaskableError); ok {
logrus.Debugf("Retrying predefined pool search: %v", err)
goto retry
}
return "", nil, nil, err
}
if err := a.writeToStore(aSpace); err != nil {
if _, ok := err.(types.RetryError); !ok {
return "", nil, nil, types.InternalErrorf("pool configuration failed because of %s", err.Error())
}
goto retry
}
return k.String(), nw, nil, insert()
}
|
[
"func",
"(",
"a",
"*",
"Allocator",
")",
"RequestPool",
"(",
"addressSpace",
",",
"pool",
",",
"subPool",
"string",
",",
"options",
"map",
"[",
"string",
"]",
"string",
",",
"v6",
"bool",
")",
"(",
"string",
",",
"*",
"net",
".",
"IPNet",
",",
"map",
"[",
"string",
"]",
"string",
",",
"error",
")",
"{",
"logrus",
".",
"Debugf",
"(",
"\"RequestPool(%s, %s, %s, %v, %t)\"",
",",
"addressSpace",
",",
"pool",
",",
"subPool",
",",
"options",
",",
"v6",
")",
"\n",
"k",
",",
"nw",
",",
"ipr",
",",
"err",
":=",
"a",
".",
"parsePoolRequest",
"(",
"addressSpace",
",",
"pool",
",",
"subPool",
",",
"v6",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"\"",
",",
"nil",
",",
"nil",
",",
"types",
".",
"InternalErrorf",
"(",
"\"failed to parse pool request for address space %q pool %q subpool %q: %v\"",
",",
"addressSpace",
",",
"pool",
",",
"subPool",
",",
"err",
")",
"\n",
"}",
"\n",
"pdf",
":=",
"k",
"==",
"nil",
"\n",
"retry",
":",
"if",
"pdf",
"{",
"if",
"nw",
",",
"err",
"=",
"a",
".",
"getPredefinedPool",
"(",
"addressSpace",
",",
"v6",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"\"\"",
",",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"k",
"=",
"&",
"SubnetKey",
"{",
"AddressSpace",
":",
"addressSpace",
",",
"Subnet",
":",
"nw",
".",
"String",
"(",
")",
"}",
"\n",
"}",
"\n",
"if",
"err",
":=",
"a",
".",
"refresh",
"(",
"addressSpace",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"\"\"",
",",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"aSpace",
",",
"err",
":=",
"a",
".",
"getAddrSpace",
"(",
"addressSpace",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"\"",
",",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"insert",
",",
"err",
":=",
"aSpace",
".",
"updatePoolDBOnAdd",
"(",
"*",
"k",
",",
"nw",
",",
"ipr",
",",
"pdf",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"_",
",",
"ok",
":=",
"err",
".",
"(",
"types",
".",
"MaskableError",
")",
";",
"ok",
"{",
"logrus",
".",
"Debugf",
"(",
"\"Retrying predefined pool search: %v\"",
",",
"err",
")",
"\n",
"goto",
"retry",
"\n",
"}",
"\n",
"return",
"\"\"",
",",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"err",
":=",
"a",
".",
"writeToStore",
"(",
"aSpace",
")",
";",
"err",
"!=",
"nil",
"{",
"if",
"_",
",",
"ok",
":=",
"err",
".",
"(",
"types",
".",
"RetryError",
")",
";",
"!",
"ok",
"{",
"return",
"\"\"",
",",
"nil",
",",
"nil",
",",
"types",
".",
"InternalErrorf",
"(",
"\"pool configuration failed because of %s\"",
",",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n",
"goto",
"retry",
"\n",
"}",
"\n",
"return",
"k",
".",
"String",
"(",
")",
",",
"nw",
",",
"nil",
",",
"insert",
"(",
")",
"\n",
"}"
] |
// RequestPool returns an address pool along with its unique id.
// addressSpace must be a valid address space name and must not be the empty string.
// If pool is the empty string then the default predefined pool for addressSpace will be used, otherwise pool must be a valid IP address and length in CIDR notation.
// If subPool is not empty, it must be a valid IP address and length in CIDR notation which is a sub-range of pool.
// subPool must be empty if pool is empty.
|
[
"RequestPool",
"returns",
"an",
"address",
"pool",
"along",
"with",
"its",
"unique",
"id",
".",
"addressSpace",
"must",
"be",
"a",
"valid",
"address",
"space",
"name",
"and",
"must",
"not",
"be",
"the",
"empty",
"string",
".",
"If",
"pool",
"is",
"the",
"empty",
"string",
"then",
"the",
"default",
"predefined",
"pool",
"for",
"addressSpace",
"will",
"be",
"used",
"otherwise",
"pool",
"must",
"be",
"a",
"valid",
"IP",
"address",
"and",
"length",
"in",
"CIDR",
"notation",
".",
"If",
"subPool",
"is",
"not",
"empty",
"it",
"must",
"be",
"a",
"valid",
"IP",
"address",
"and",
"length",
"in",
"CIDR",
"notation",
"which",
"is",
"a",
"sub",
"-",
"range",
"of",
"pool",
".",
"subPool",
"must",
"be",
"empty",
"if",
"pool",
"is",
"empty",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipam/allocator.go#L211-L256
|
train
|
docker/libnetwork
|
ipam/allocator.go
|
ReleasePool
|
func (a *Allocator) ReleasePool(poolID string) error {
logrus.Debugf("ReleasePool(%s)", poolID)
k := SubnetKey{}
if err := k.FromString(poolID); err != nil {
return types.BadRequestErrorf("invalid pool id: %s", poolID)
}
retry:
if err := a.refresh(k.AddressSpace); err != nil {
return err
}
aSpace, err := a.getAddrSpace(k.AddressSpace)
if err != nil {
return err
}
remove, err := aSpace.updatePoolDBOnRemoval(k)
if err != nil {
return err
}
if err = a.writeToStore(aSpace); err != nil {
if _, ok := err.(types.RetryError); !ok {
return types.InternalErrorf("pool (%s) removal failed because of %v", poolID, err)
}
goto retry
}
return remove()
}
|
go
|
func (a *Allocator) ReleasePool(poolID string) error {
logrus.Debugf("ReleasePool(%s)", poolID)
k := SubnetKey{}
if err := k.FromString(poolID); err != nil {
return types.BadRequestErrorf("invalid pool id: %s", poolID)
}
retry:
if err := a.refresh(k.AddressSpace); err != nil {
return err
}
aSpace, err := a.getAddrSpace(k.AddressSpace)
if err != nil {
return err
}
remove, err := aSpace.updatePoolDBOnRemoval(k)
if err != nil {
return err
}
if err = a.writeToStore(aSpace); err != nil {
if _, ok := err.(types.RetryError); !ok {
return types.InternalErrorf("pool (%s) removal failed because of %v", poolID, err)
}
goto retry
}
return remove()
}
|
[
"func",
"(",
"a",
"*",
"Allocator",
")",
"ReleasePool",
"(",
"poolID",
"string",
")",
"error",
"{",
"logrus",
".",
"Debugf",
"(",
"\"ReleasePool(%s)\"",
",",
"poolID",
")",
"\n",
"k",
":=",
"SubnetKey",
"{",
"}",
"\n",
"if",
"err",
":=",
"k",
".",
"FromString",
"(",
"poolID",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"types",
".",
"BadRequestErrorf",
"(",
"\"invalid pool id: %s\"",
",",
"poolID",
")",
"\n",
"}",
"\n",
"retry",
":",
"if",
"err",
":=",
"a",
".",
"refresh",
"(",
"k",
".",
"AddressSpace",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"aSpace",
",",
"err",
":=",
"a",
".",
"getAddrSpace",
"(",
"k",
".",
"AddressSpace",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"remove",
",",
"err",
":=",
"aSpace",
".",
"updatePoolDBOnRemoval",
"(",
"k",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"if",
"err",
"=",
"a",
".",
"writeToStore",
"(",
"aSpace",
")",
";",
"err",
"!=",
"nil",
"{",
"if",
"_",
",",
"ok",
":=",
"err",
".",
"(",
"types",
".",
"RetryError",
")",
";",
"!",
"ok",
"{",
"return",
"types",
".",
"InternalErrorf",
"(",
"\"pool (%s) removal failed because of %v\"",
",",
"poolID",
",",
"err",
")",
"\n",
"}",
"\n",
"goto",
"retry",
"\n",
"}",
"\n",
"return",
"remove",
"(",
")",
"\n",
"}"
] |
// ReleasePool releases the address pool identified by the passed id
|
[
"ReleasePool",
"releases",
"the",
"address",
"pool",
"identified",
"by",
"the",
"passed",
"id"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipam/allocator.go#L259-L289
|
train
|
docker/libnetwork
|
ipam/allocator.go
|
getAddrSpace
|
func (a *Allocator) getAddrSpace(as string) (*addrSpace, error) {
a.Lock()
defer a.Unlock()
aSpace, ok := a.addrSpaces[as]
if !ok {
return nil, types.BadRequestErrorf("cannot find address space %s (most likely the backing datastore is not configured)", as)
}
return aSpace, nil
}
|
go
|
func (a *Allocator) getAddrSpace(as string) (*addrSpace, error) {
a.Lock()
defer a.Unlock()
aSpace, ok := a.addrSpaces[as]
if !ok {
return nil, types.BadRequestErrorf("cannot find address space %s (most likely the backing datastore is not configured)", as)
}
return aSpace, nil
}
|
[
"func",
"(",
"a",
"*",
"Allocator",
")",
"getAddrSpace",
"(",
"as",
"string",
")",
"(",
"*",
"addrSpace",
",",
"error",
")",
"{",
"a",
".",
"Lock",
"(",
")",
"\n",
"defer",
"a",
".",
"Unlock",
"(",
")",
"\n",
"aSpace",
",",
"ok",
":=",
"a",
".",
"addrSpaces",
"[",
"as",
"]",
"\n",
"if",
"!",
"ok",
"{",
"return",
"nil",
",",
"types",
".",
"BadRequestErrorf",
"(",
"\"cannot find address space %s (most likely the backing datastore is not configured)\"",
",",
"as",
")",
"\n",
"}",
"\n",
"return",
"aSpace",
",",
"nil",
"\n",
"}"
] |
// Given the address space, returns the local or global PoolConfig based on whether the
// address space is local or global. AddressSpace locality is registered with IPAM out of band.
|
[
"Given",
"the",
"address",
"space",
"returns",
"the",
"local",
"or",
"global",
"PoolConfig",
"based",
"on",
"whether",
"the",
"address",
"space",
"is",
"local",
"or",
"global",
".",
"AddressSpace",
"locality",
"is",
"registered",
"with",
"IPAM",
"out",
"of",
"band",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipam/allocator.go#L293-L301
|
train
|
docker/libnetwork
|
ipam/allocator.go
|
parsePoolRequest
|
func (a *Allocator) parsePoolRequest(addressSpace, pool, subPool string, v6 bool) (*SubnetKey, *net.IPNet, *AddressRange, error) {
var (
nw *net.IPNet
ipr *AddressRange
err error
)
if addressSpace == "" {
return nil, nil, nil, ipamapi.ErrInvalidAddressSpace
}
if pool == "" && subPool != "" {
return nil, nil, nil, ipamapi.ErrInvalidSubPool
}
if pool == "" {
return nil, nil, nil, nil
}
if _, nw, err = net.ParseCIDR(pool); err != nil {
return nil, nil, nil, ipamapi.ErrInvalidPool
}
if subPool != "" {
if ipr, err = getAddressRange(subPool, nw); err != nil {
return nil, nil, nil, err
}
}
return &SubnetKey{AddressSpace: addressSpace, Subnet: nw.String(), ChildSubnet: subPool}, nw, ipr, nil
}
|
go
|
func (a *Allocator) parsePoolRequest(addressSpace, pool, subPool string, v6 bool) (*SubnetKey, *net.IPNet, *AddressRange, error) {
var (
nw *net.IPNet
ipr *AddressRange
err error
)
if addressSpace == "" {
return nil, nil, nil, ipamapi.ErrInvalidAddressSpace
}
if pool == "" && subPool != "" {
return nil, nil, nil, ipamapi.ErrInvalidSubPool
}
if pool == "" {
return nil, nil, nil, nil
}
if _, nw, err = net.ParseCIDR(pool); err != nil {
return nil, nil, nil, ipamapi.ErrInvalidPool
}
if subPool != "" {
if ipr, err = getAddressRange(subPool, nw); err != nil {
return nil, nil, nil, err
}
}
return &SubnetKey{AddressSpace: addressSpace, Subnet: nw.String(), ChildSubnet: subPool}, nw, ipr, nil
}
|
[
"func",
"(",
"a",
"*",
"Allocator",
")",
"parsePoolRequest",
"(",
"addressSpace",
",",
"pool",
",",
"subPool",
"string",
",",
"v6",
"bool",
")",
"(",
"*",
"SubnetKey",
",",
"*",
"net",
".",
"IPNet",
",",
"*",
"AddressRange",
",",
"error",
")",
"{",
"var",
"(",
"nw",
"*",
"net",
".",
"IPNet",
"\n",
"ipr",
"*",
"AddressRange",
"\n",
"err",
"error",
"\n",
")",
"\n",
"if",
"addressSpace",
"==",
"\"\"",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"ipamapi",
".",
"ErrInvalidAddressSpace",
"\n",
"}",
"\n",
"if",
"pool",
"==",
"\"\"",
"&&",
"subPool",
"!=",
"\"\"",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"ipamapi",
".",
"ErrInvalidSubPool",
"\n",
"}",
"\n",
"if",
"pool",
"==",
"\"\"",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"nil",
"\n",
"}",
"\n",
"if",
"_",
",",
"nw",
",",
"err",
"=",
"net",
".",
"ParseCIDR",
"(",
"pool",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"ipamapi",
".",
"ErrInvalidPool",
"\n",
"}",
"\n",
"if",
"subPool",
"!=",
"\"\"",
"{",
"if",
"ipr",
",",
"err",
"=",
"getAddressRange",
"(",
"subPool",
",",
"nw",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"&",
"SubnetKey",
"{",
"AddressSpace",
":",
"addressSpace",
",",
"Subnet",
":",
"nw",
".",
"String",
"(",
")",
",",
"ChildSubnet",
":",
"subPool",
"}",
",",
"nw",
",",
"ipr",
",",
"nil",
"\n",
"}"
] |
// parsePoolRequest parses and validates a request to create a new pool under addressSpace and returns
// a SubnetKey, network and range describing the request.
|
[
"parsePoolRequest",
"parses",
"and",
"validates",
"a",
"request",
"to",
"create",
"a",
"new",
"pool",
"under",
"addressSpace",
"and",
"returns",
"a",
"SubnetKey",
"network",
"and",
"range",
"describing",
"the",
"request",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipam/allocator.go#L305-L335
|
train
|
docker/libnetwork
|
ipam/allocator.go
|
RequestAddress
|
func (a *Allocator) RequestAddress(poolID string, prefAddress net.IP, opts map[string]string) (*net.IPNet, map[string]string, error) {
logrus.Debugf("RequestAddress(%s, %v, %v)", poolID, prefAddress, opts)
k := SubnetKey{}
if err := k.FromString(poolID); err != nil {
return nil, nil, types.BadRequestErrorf("invalid pool id: %s", poolID)
}
if err := a.refresh(k.AddressSpace); err != nil {
return nil, nil, err
}
aSpace, err := a.getAddrSpace(k.AddressSpace)
if err != nil {
return nil, nil, err
}
aSpace.Lock()
p, ok := aSpace.subnets[k]
if !ok {
aSpace.Unlock()
return nil, nil, types.NotFoundErrorf("cannot find address pool for poolID:%s", poolID)
}
if prefAddress != nil && !p.Pool.Contains(prefAddress) {
aSpace.Unlock()
return nil, nil, ipamapi.ErrIPOutOfRange
}
c := p
for c.Range != nil {
k = c.ParentKey
c = aSpace.subnets[k]
}
aSpace.Unlock()
bm, err := a.retrieveBitmask(k, c.Pool)
if err != nil {
return nil, nil, types.InternalErrorf("could not find bitmask in datastore for %s on address %v request from pool %s: %v",
k.String(), prefAddress, poolID, err)
}
// In order to request for a serial ip address allocation, callers can pass in the option to request
// IP allocation serially or first available IP in the subnet
var serial bool
if opts != nil {
if val, ok := opts[ipamapi.AllocSerialPrefix]; ok {
serial = (val == "true")
}
}
ip, err := a.getAddress(p.Pool, bm, prefAddress, p.Range, serial)
if err != nil {
return nil, nil, err
}
return &net.IPNet{IP: ip, Mask: p.Pool.Mask}, nil, nil
}
|
go
|
func (a *Allocator) RequestAddress(poolID string, prefAddress net.IP, opts map[string]string) (*net.IPNet, map[string]string, error) {
logrus.Debugf("RequestAddress(%s, %v, %v)", poolID, prefAddress, opts)
k := SubnetKey{}
if err := k.FromString(poolID); err != nil {
return nil, nil, types.BadRequestErrorf("invalid pool id: %s", poolID)
}
if err := a.refresh(k.AddressSpace); err != nil {
return nil, nil, err
}
aSpace, err := a.getAddrSpace(k.AddressSpace)
if err != nil {
return nil, nil, err
}
aSpace.Lock()
p, ok := aSpace.subnets[k]
if !ok {
aSpace.Unlock()
return nil, nil, types.NotFoundErrorf("cannot find address pool for poolID:%s", poolID)
}
if prefAddress != nil && !p.Pool.Contains(prefAddress) {
aSpace.Unlock()
return nil, nil, ipamapi.ErrIPOutOfRange
}
c := p
for c.Range != nil {
k = c.ParentKey
c = aSpace.subnets[k]
}
aSpace.Unlock()
bm, err := a.retrieveBitmask(k, c.Pool)
if err != nil {
return nil, nil, types.InternalErrorf("could not find bitmask in datastore for %s on address %v request from pool %s: %v",
k.String(), prefAddress, poolID, err)
}
// In order to request for a serial ip address allocation, callers can pass in the option to request
// IP allocation serially or first available IP in the subnet
var serial bool
if opts != nil {
if val, ok := opts[ipamapi.AllocSerialPrefix]; ok {
serial = (val == "true")
}
}
ip, err := a.getAddress(p.Pool, bm, prefAddress, p.Range, serial)
if err != nil {
return nil, nil, err
}
return &net.IPNet{IP: ip, Mask: p.Pool.Mask}, nil, nil
}
|
[
"func",
"(",
"a",
"*",
"Allocator",
")",
"RequestAddress",
"(",
"poolID",
"string",
",",
"prefAddress",
"net",
".",
"IP",
",",
"opts",
"map",
"[",
"string",
"]",
"string",
")",
"(",
"*",
"net",
".",
"IPNet",
",",
"map",
"[",
"string",
"]",
"string",
",",
"error",
")",
"{",
"logrus",
".",
"Debugf",
"(",
"\"RequestAddress(%s, %v, %v)\"",
",",
"poolID",
",",
"prefAddress",
",",
"opts",
")",
"\n",
"k",
":=",
"SubnetKey",
"{",
"}",
"\n",
"if",
"err",
":=",
"k",
".",
"FromString",
"(",
"poolID",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"types",
".",
"BadRequestErrorf",
"(",
"\"invalid pool id: %s\"",
",",
"poolID",
")",
"\n",
"}",
"\n",
"if",
"err",
":=",
"a",
".",
"refresh",
"(",
"k",
".",
"AddressSpace",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"aSpace",
",",
"err",
":=",
"a",
".",
"getAddrSpace",
"(",
"k",
".",
"AddressSpace",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"aSpace",
".",
"Lock",
"(",
")",
"\n",
"p",
",",
"ok",
":=",
"aSpace",
".",
"subnets",
"[",
"k",
"]",
"\n",
"if",
"!",
"ok",
"{",
"aSpace",
".",
"Unlock",
"(",
")",
"\n",
"return",
"nil",
",",
"nil",
",",
"types",
".",
"NotFoundErrorf",
"(",
"\"cannot find address pool for poolID:%s\"",
",",
"poolID",
")",
"\n",
"}",
"\n",
"if",
"prefAddress",
"!=",
"nil",
"&&",
"!",
"p",
".",
"Pool",
".",
"Contains",
"(",
"prefAddress",
")",
"{",
"aSpace",
".",
"Unlock",
"(",
")",
"\n",
"return",
"nil",
",",
"nil",
",",
"ipamapi",
".",
"ErrIPOutOfRange",
"\n",
"}",
"\n",
"c",
":=",
"p",
"\n",
"for",
"c",
".",
"Range",
"!=",
"nil",
"{",
"k",
"=",
"c",
".",
"ParentKey",
"\n",
"c",
"=",
"aSpace",
".",
"subnets",
"[",
"k",
"]",
"\n",
"}",
"\n",
"aSpace",
".",
"Unlock",
"(",
")",
"\n",
"bm",
",",
"err",
":=",
"a",
".",
"retrieveBitmask",
"(",
"k",
",",
"c",
".",
"Pool",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"types",
".",
"InternalErrorf",
"(",
"\"could not find bitmask in datastore for %s on address %v request from pool %s: %v\"",
",",
"k",
".",
"String",
"(",
")",
",",
"prefAddress",
",",
"poolID",
",",
"err",
")",
"\n",
"}",
"\n",
"var",
"serial",
"bool",
"\n",
"if",
"opts",
"!=",
"nil",
"{",
"if",
"val",
",",
"ok",
":=",
"opts",
"[",
"ipamapi",
".",
"AllocSerialPrefix",
"]",
";",
"ok",
"{",
"serial",
"=",
"(",
"val",
"==",
"\"true\"",
")",
"\n",
"}",
"\n",
"}",
"\n",
"ip",
",",
"err",
":=",
"a",
".",
"getAddress",
"(",
"p",
".",
"Pool",
",",
"bm",
",",
"prefAddress",
",",
"p",
".",
"Range",
",",
"serial",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"&",
"net",
".",
"IPNet",
"{",
"IP",
":",
"ip",
",",
"Mask",
":",
"p",
".",
"Pool",
".",
"Mask",
"}",
",",
"nil",
",",
"nil",
"\n",
"}"
] |
// RequestAddress returns an address from the specified pool ID
|
[
"RequestAddress",
"returns",
"an",
"address",
"from",
"the",
"specified",
"pool",
"ID"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipam/allocator.go#L451-L505
|
train
|
docker/libnetwork
|
ipam/allocator.go
|
ReleaseAddress
|
func (a *Allocator) ReleaseAddress(poolID string, address net.IP) error {
logrus.Debugf("ReleaseAddress(%s, %v)", poolID, address)
k := SubnetKey{}
if err := k.FromString(poolID); err != nil {
return types.BadRequestErrorf("invalid pool id: %s", poolID)
}
if err := a.refresh(k.AddressSpace); err != nil {
return err
}
aSpace, err := a.getAddrSpace(k.AddressSpace)
if err != nil {
return err
}
aSpace.Lock()
p, ok := aSpace.subnets[k]
if !ok {
aSpace.Unlock()
return types.NotFoundErrorf("cannot find address pool for poolID:%s", poolID)
}
if address == nil {
aSpace.Unlock()
return types.BadRequestErrorf("invalid address: nil")
}
if !p.Pool.Contains(address) {
aSpace.Unlock()
return ipamapi.ErrIPOutOfRange
}
c := p
for c.Range != nil {
k = c.ParentKey
c = aSpace.subnets[k]
}
aSpace.Unlock()
mask := p.Pool.Mask
h, err := types.GetHostPartIP(address, mask)
if err != nil {
return types.InternalErrorf("failed to release address %s: %v", address.String(), err)
}
bm, err := a.retrieveBitmask(k, c.Pool)
if err != nil {
return types.InternalErrorf("could not find bitmask in datastore for %s on address %v release from pool %s: %v",
k.String(), address, poolID, err)
}
defer logrus.Debugf("Released address PoolID:%s, Address:%v Sequence:%s", poolID, address, bm.String())
return bm.Unset(ipToUint64(h))
}
|
go
|
func (a *Allocator) ReleaseAddress(poolID string, address net.IP) error {
logrus.Debugf("ReleaseAddress(%s, %v)", poolID, address)
k := SubnetKey{}
if err := k.FromString(poolID); err != nil {
return types.BadRequestErrorf("invalid pool id: %s", poolID)
}
if err := a.refresh(k.AddressSpace); err != nil {
return err
}
aSpace, err := a.getAddrSpace(k.AddressSpace)
if err != nil {
return err
}
aSpace.Lock()
p, ok := aSpace.subnets[k]
if !ok {
aSpace.Unlock()
return types.NotFoundErrorf("cannot find address pool for poolID:%s", poolID)
}
if address == nil {
aSpace.Unlock()
return types.BadRequestErrorf("invalid address: nil")
}
if !p.Pool.Contains(address) {
aSpace.Unlock()
return ipamapi.ErrIPOutOfRange
}
c := p
for c.Range != nil {
k = c.ParentKey
c = aSpace.subnets[k]
}
aSpace.Unlock()
mask := p.Pool.Mask
h, err := types.GetHostPartIP(address, mask)
if err != nil {
return types.InternalErrorf("failed to release address %s: %v", address.String(), err)
}
bm, err := a.retrieveBitmask(k, c.Pool)
if err != nil {
return types.InternalErrorf("could not find bitmask in datastore for %s on address %v release from pool %s: %v",
k.String(), address, poolID, err)
}
defer logrus.Debugf("Released address PoolID:%s, Address:%v Sequence:%s", poolID, address, bm.String())
return bm.Unset(ipToUint64(h))
}
|
[
"func",
"(",
"a",
"*",
"Allocator",
")",
"ReleaseAddress",
"(",
"poolID",
"string",
",",
"address",
"net",
".",
"IP",
")",
"error",
"{",
"logrus",
".",
"Debugf",
"(",
"\"ReleaseAddress(%s, %v)\"",
",",
"poolID",
",",
"address",
")",
"\n",
"k",
":=",
"SubnetKey",
"{",
"}",
"\n",
"if",
"err",
":=",
"k",
".",
"FromString",
"(",
"poolID",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"types",
".",
"BadRequestErrorf",
"(",
"\"invalid pool id: %s\"",
",",
"poolID",
")",
"\n",
"}",
"\n",
"if",
"err",
":=",
"a",
".",
"refresh",
"(",
"k",
".",
"AddressSpace",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"aSpace",
",",
"err",
":=",
"a",
".",
"getAddrSpace",
"(",
"k",
".",
"AddressSpace",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"aSpace",
".",
"Lock",
"(",
")",
"\n",
"p",
",",
"ok",
":=",
"aSpace",
".",
"subnets",
"[",
"k",
"]",
"\n",
"if",
"!",
"ok",
"{",
"aSpace",
".",
"Unlock",
"(",
")",
"\n",
"return",
"types",
".",
"NotFoundErrorf",
"(",
"\"cannot find address pool for poolID:%s\"",
",",
"poolID",
")",
"\n",
"}",
"\n",
"if",
"address",
"==",
"nil",
"{",
"aSpace",
".",
"Unlock",
"(",
")",
"\n",
"return",
"types",
".",
"BadRequestErrorf",
"(",
"\"invalid address: nil\"",
")",
"\n",
"}",
"\n",
"if",
"!",
"p",
".",
"Pool",
".",
"Contains",
"(",
"address",
")",
"{",
"aSpace",
".",
"Unlock",
"(",
")",
"\n",
"return",
"ipamapi",
".",
"ErrIPOutOfRange",
"\n",
"}",
"\n",
"c",
":=",
"p",
"\n",
"for",
"c",
".",
"Range",
"!=",
"nil",
"{",
"k",
"=",
"c",
".",
"ParentKey",
"\n",
"c",
"=",
"aSpace",
".",
"subnets",
"[",
"k",
"]",
"\n",
"}",
"\n",
"aSpace",
".",
"Unlock",
"(",
")",
"\n",
"mask",
":=",
"p",
".",
"Pool",
".",
"Mask",
"\n",
"h",
",",
"err",
":=",
"types",
".",
"GetHostPartIP",
"(",
"address",
",",
"mask",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"types",
".",
"InternalErrorf",
"(",
"\"failed to release address %s: %v\"",
",",
"address",
".",
"String",
"(",
")",
",",
"err",
")",
"\n",
"}",
"\n",
"bm",
",",
"err",
":=",
"a",
".",
"retrieveBitmask",
"(",
"k",
",",
"c",
".",
"Pool",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"types",
".",
"InternalErrorf",
"(",
"\"could not find bitmask in datastore for %s on address %v release from pool %s: %v\"",
",",
"k",
".",
"String",
"(",
")",
",",
"address",
",",
"poolID",
",",
"err",
")",
"\n",
"}",
"\n",
"defer",
"logrus",
".",
"Debugf",
"(",
"\"Released address PoolID:%s, Address:%v Sequence:%s\"",
",",
"poolID",
",",
"address",
",",
"bm",
".",
"String",
"(",
")",
")",
"\n",
"return",
"bm",
".",
"Unset",
"(",
"ipToUint64",
"(",
"h",
")",
")",
"\n",
"}"
] |
// ReleaseAddress releases the address from the specified pool ID
|
[
"ReleaseAddress",
"releases",
"the",
"address",
"from",
"the",
"specified",
"pool",
"ID"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipam/allocator.go#L508-L563
|
train
|
docker/libnetwork
|
ipam/allocator.go
|
DumpDatabase
|
func (a *Allocator) DumpDatabase() string {
a.Lock()
aspaces := make(map[string]*addrSpace, len(a.addrSpaces))
orderedAS := make([]string, 0, len(a.addrSpaces))
for as, aSpace := range a.addrSpaces {
orderedAS = append(orderedAS, as)
aspaces[as] = aSpace
}
a.Unlock()
sort.Strings(orderedAS)
var s string
for _, as := range orderedAS {
aSpace := aspaces[as]
s = fmt.Sprintf("\n\n%s Config", as)
aSpace.Lock()
for k, config := range aSpace.subnets {
s += fmt.Sprintf("\n%v: %v", k, config)
if config.Range == nil {
a.retrieveBitmask(k, config.Pool)
}
}
aSpace.Unlock()
}
s = fmt.Sprintf("%s\n\nBitmasks", s)
for k, bm := range a.addresses {
s += fmt.Sprintf("\n%s: %s", k, bm)
}
return s
}
|
go
|
func (a *Allocator) DumpDatabase() string {
a.Lock()
aspaces := make(map[string]*addrSpace, len(a.addrSpaces))
orderedAS := make([]string, 0, len(a.addrSpaces))
for as, aSpace := range a.addrSpaces {
orderedAS = append(orderedAS, as)
aspaces[as] = aSpace
}
a.Unlock()
sort.Strings(orderedAS)
var s string
for _, as := range orderedAS {
aSpace := aspaces[as]
s = fmt.Sprintf("\n\n%s Config", as)
aSpace.Lock()
for k, config := range aSpace.subnets {
s += fmt.Sprintf("\n%v: %v", k, config)
if config.Range == nil {
a.retrieveBitmask(k, config.Pool)
}
}
aSpace.Unlock()
}
s = fmt.Sprintf("%s\n\nBitmasks", s)
for k, bm := range a.addresses {
s += fmt.Sprintf("\n%s: %s", k, bm)
}
return s
}
|
[
"func",
"(",
"a",
"*",
"Allocator",
")",
"DumpDatabase",
"(",
")",
"string",
"{",
"a",
".",
"Lock",
"(",
")",
"\n",
"aspaces",
":=",
"make",
"(",
"map",
"[",
"string",
"]",
"*",
"addrSpace",
",",
"len",
"(",
"a",
".",
"addrSpaces",
")",
")",
"\n",
"orderedAS",
":=",
"make",
"(",
"[",
"]",
"string",
",",
"0",
",",
"len",
"(",
"a",
".",
"addrSpaces",
")",
")",
"\n",
"for",
"as",
",",
"aSpace",
":=",
"range",
"a",
".",
"addrSpaces",
"{",
"orderedAS",
"=",
"append",
"(",
"orderedAS",
",",
"as",
")",
"\n",
"aspaces",
"[",
"as",
"]",
"=",
"aSpace",
"\n",
"}",
"\n",
"a",
".",
"Unlock",
"(",
")",
"\n",
"sort",
".",
"Strings",
"(",
"orderedAS",
")",
"\n",
"var",
"s",
"string",
"\n",
"for",
"_",
",",
"as",
":=",
"range",
"orderedAS",
"{",
"aSpace",
":=",
"aspaces",
"[",
"as",
"]",
"\n",
"s",
"=",
"fmt",
".",
"Sprintf",
"(",
"\"\\n\\n%s Config\"",
",",
"\\n",
")",
"\n",
"\\n",
"\n",
"as",
"\n",
"aSpace",
".",
"Lock",
"(",
")",
"\n",
"}",
"\n",
"for",
"k",
",",
"config",
":=",
"range",
"aSpace",
".",
"subnets",
"{",
"s",
"+=",
"fmt",
".",
"Sprintf",
"(",
"\"\\n%v: %v\"",
",",
"\\n",
",",
"k",
")",
"\n",
"config",
"\n",
"}",
"\n",
"if",
"config",
".",
"Range",
"==",
"nil",
"{",
"a",
".",
"retrieveBitmask",
"(",
"k",
",",
"config",
".",
"Pool",
")",
"\n",
"}",
"\n",
"aSpace",
".",
"Unlock",
"(",
")",
"\n",
"}"
] |
// DumpDatabase dumps the internal info
|
[
"DumpDatabase",
"dumps",
"the",
"internal",
"info"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipam/allocator.go#L605-L637
|
train
|
docker/libnetwork
|
service_linux.go
|
populateLoadBalancers
|
func (sb *sandbox) populateLoadBalancers(ep *endpoint) {
// This is an interface less endpoint. Nothing to do.
if ep.Iface() == nil {
return
}
n := ep.getNetwork()
eIP := ep.Iface().Address()
if n.ingress {
if err := addRedirectRules(sb.Key(), eIP, ep.ingressPorts); err != nil {
logrus.Errorf("Failed to add redirect rules for ep %s (%.7s): %v", ep.Name(), ep.ID(), err)
}
}
}
|
go
|
func (sb *sandbox) populateLoadBalancers(ep *endpoint) {
// This is an interface less endpoint. Nothing to do.
if ep.Iface() == nil {
return
}
n := ep.getNetwork()
eIP := ep.Iface().Address()
if n.ingress {
if err := addRedirectRules(sb.Key(), eIP, ep.ingressPorts); err != nil {
logrus.Errorf("Failed to add redirect rules for ep %s (%.7s): %v", ep.Name(), ep.ID(), err)
}
}
}
|
[
"func",
"(",
"sb",
"*",
"sandbox",
")",
"populateLoadBalancers",
"(",
"ep",
"*",
"endpoint",
")",
"{",
"if",
"ep",
".",
"Iface",
"(",
")",
"==",
"nil",
"{",
"return",
"\n",
"}",
"\n",
"n",
":=",
"ep",
".",
"getNetwork",
"(",
")",
"\n",
"eIP",
":=",
"ep",
".",
"Iface",
"(",
")",
".",
"Address",
"(",
")",
"\n",
"if",
"n",
".",
"ingress",
"{",
"if",
"err",
":=",
"addRedirectRules",
"(",
"sb",
".",
"Key",
"(",
")",
",",
"eIP",
",",
"ep",
".",
"ingressPorts",
")",
";",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Errorf",
"(",
"\"Failed to add redirect rules for ep %s (%.7s): %v\"",
",",
"ep",
".",
"Name",
"(",
")",
",",
"ep",
".",
"ID",
"(",
")",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] |
// Populate all loadbalancers on the network that the passed endpoint
// belongs to, into this sandbox.
|
[
"Populate",
"all",
"loadbalancers",
"on",
"the",
"network",
"that",
"the",
"passed",
"endpoint",
"belongs",
"to",
"into",
"this",
"sandbox",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/service_linux.go#L35-L49
|
train
|
docker/libnetwork
|
service_linux.go
|
invokeFWMarker
|
func invokeFWMarker(path string, vip net.IP, fwMark uint32, ingressPorts []*PortConfig, eIP *net.IPNet, isDelete bool, lbMode string) error {
var ingressPortsFile string
if len(ingressPorts) != 0 {
var err error
ingressPortsFile, err = writePortsToFile(ingressPorts)
if err != nil {
return err
}
defer os.Remove(ingressPortsFile)
}
addDelOpt := "-A"
if isDelete {
addDelOpt = "-D"
}
cmd := &exec.Cmd{
Path: reexec.Self(),
Args: append([]string{"fwmarker"}, path, vip.String(), fmt.Sprintf("%d", fwMark), addDelOpt, ingressPortsFile, eIP.String(), lbMode),
Stdout: os.Stdout,
Stderr: os.Stderr,
}
if err := cmd.Run(); err != nil {
return fmt.Errorf("reexec failed: %v", err)
}
return nil
}
|
go
|
func invokeFWMarker(path string, vip net.IP, fwMark uint32, ingressPorts []*PortConfig, eIP *net.IPNet, isDelete bool, lbMode string) error {
var ingressPortsFile string
if len(ingressPorts) != 0 {
var err error
ingressPortsFile, err = writePortsToFile(ingressPorts)
if err != nil {
return err
}
defer os.Remove(ingressPortsFile)
}
addDelOpt := "-A"
if isDelete {
addDelOpt = "-D"
}
cmd := &exec.Cmd{
Path: reexec.Self(),
Args: append([]string{"fwmarker"}, path, vip.String(), fmt.Sprintf("%d", fwMark), addDelOpt, ingressPortsFile, eIP.String(), lbMode),
Stdout: os.Stdout,
Stderr: os.Stderr,
}
if err := cmd.Run(); err != nil {
return fmt.Errorf("reexec failed: %v", err)
}
return nil
}
|
[
"func",
"invokeFWMarker",
"(",
"path",
"string",
",",
"vip",
"net",
".",
"IP",
",",
"fwMark",
"uint32",
",",
"ingressPorts",
"[",
"]",
"*",
"PortConfig",
",",
"eIP",
"*",
"net",
".",
"IPNet",
",",
"isDelete",
"bool",
",",
"lbMode",
"string",
")",
"error",
"{",
"var",
"ingressPortsFile",
"string",
"\n",
"if",
"len",
"(",
"ingressPorts",
")",
"!=",
"0",
"{",
"var",
"err",
"error",
"\n",
"ingressPortsFile",
",",
"err",
"=",
"writePortsToFile",
"(",
"ingressPorts",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"defer",
"os",
".",
"Remove",
"(",
"ingressPortsFile",
")",
"\n",
"}",
"\n",
"addDelOpt",
":=",
"\"-A\"",
"\n",
"if",
"isDelete",
"{",
"addDelOpt",
"=",
"\"-D\"",
"\n",
"}",
"\n",
"cmd",
":=",
"&",
"exec",
".",
"Cmd",
"{",
"Path",
":",
"reexec",
".",
"Self",
"(",
")",
",",
"Args",
":",
"append",
"(",
"[",
"]",
"string",
"{",
"\"fwmarker\"",
"}",
",",
"path",
",",
"vip",
".",
"String",
"(",
")",
",",
"fmt",
".",
"Sprintf",
"(",
"\"%d\"",
",",
"fwMark",
")",
",",
"addDelOpt",
",",
"ingressPortsFile",
",",
"eIP",
".",
"String",
"(",
")",
",",
"lbMode",
")",
",",
"Stdout",
":",
"os",
".",
"Stdout",
",",
"Stderr",
":",
"os",
".",
"Stderr",
",",
"}",
"\n",
"if",
"err",
":=",
"cmd",
".",
"Run",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"reexec failed: %v\"",
",",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] |
// Invoke fwmarker reexec routine to mark vip destined packets with
// the passed firewall mark.
|
[
"Invoke",
"fwmarker",
"reexec",
"routine",
"to",
"mark",
"vip",
"destined",
"packets",
"with",
"the",
"passed",
"firewall",
"mark",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/service_linux.go#L575-L605
|
train
|
docker/libnetwork
|
drivers/windows/windows.go
|
IsBuiltinLocalDriver
|
func IsBuiltinLocalDriver(networkType string) bool {
if "l2bridge" == networkType || "l2tunnel" == networkType || "nat" == networkType || "ics" == networkType || "transparent" == networkType {
return true
}
return false
}
|
go
|
func IsBuiltinLocalDriver(networkType string) bool {
if "l2bridge" == networkType || "l2tunnel" == networkType || "nat" == networkType || "ics" == networkType || "transparent" == networkType {
return true
}
return false
}
|
[
"func",
"IsBuiltinLocalDriver",
"(",
"networkType",
"string",
")",
"bool",
"{",
"if",
"\"l2bridge\"",
"==",
"networkType",
"||",
"\"l2tunnel\"",
"==",
"networkType",
"||",
"\"nat\"",
"==",
"networkType",
"||",
"\"ics\"",
"==",
"networkType",
"||",
"\"transparent\"",
"==",
"networkType",
"{",
"return",
"true",
"\n",
"}",
"\n",
"return",
"false",
"\n",
"}"
] |
// IsBuiltinLocalDriver validates if network-type is a builtin local-scoped driver
|
[
"IsBuiltinLocalDriver",
"validates",
"if",
"network",
"-",
"type",
"is",
"a",
"builtin",
"local",
"-",
"scoped",
"driver"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/windows/windows.go#L113-L119
|
train
|
docker/libnetwork
|
drivers/windows/windows.go
|
newDriver
|
func newDriver(networkType string) *driver {
return &driver{name: networkType, networks: map[string]*hnsNetwork{}}
}
|
go
|
func newDriver(networkType string) *driver {
return &driver{name: networkType, networks: map[string]*hnsNetwork{}}
}
|
[
"func",
"newDriver",
"(",
"networkType",
"string",
")",
"*",
"driver",
"{",
"return",
"&",
"driver",
"{",
"name",
":",
"networkType",
",",
"networks",
":",
"map",
"[",
"string",
"]",
"*",
"hnsNetwork",
"{",
"}",
"}",
"\n",
"}"
] |
// New constructs a new bridge driver
|
[
"New",
"constructs",
"a",
"new",
"bridge",
"driver"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/windows/windows.go#L122-L124
|
train
|
docker/libnetwork
|
drivers/windows/windows.go
|
GetInit
|
func GetInit(networkType string) func(dc driverapi.DriverCallback, config map[string]interface{}) error {
return func(dc driverapi.DriverCallback, config map[string]interface{}) error {
if !IsBuiltinLocalDriver(networkType) {
return types.BadRequestErrorf("Network type not supported: %s", networkType)
}
d := newDriver(networkType)
err := d.initStore(config)
if err != nil {
return err
}
return dc.RegisterDriver(networkType, d, driverapi.Capability{
DataScope: datastore.LocalScope,
ConnectivityScope: datastore.LocalScope,
})
}
}
|
go
|
func GetInit(networkType string) func(dc driverapi.DriverCallback, config map[string]interface{}) error {
return func(dc driverapi.DriverCallback, config map[string]interface{}) error {
if !IsBuiltinLocalDriver(networkType) {
return types.BadRequestErrorf("Network type not supported: %s", networkType)
}
d := newDriver(networkType)
err := d.initStore(config)
if err != nil {
return err
}
return dc.RegisterDriver(networkType, d, driverapi.Capability{
DataScope: datastore.LocalScope,
ConnectivityScope: datastore.LocalScope,
})
}
}
|
[
"func",
"GetInit",
"(",
"networkType",
"string",
")",
"func",
"(",
"dc",
"driverapi",
".",
"DriverCallback",
",",
"config",
"map",
"[",
"string",
"]",
"interface",
"{",
"}",
")",
"error",
"{",
"return",
"func",
"(",
"dc",
"driverapi",
".",
"DriverCallback",
",",
"config",
"map",
"[",
"string",
"]",
"interface",
"{",
"}",
")",
"error",
"{",
"if",
"!",
"IsBuiltinLocalDriver",
"(",
"networkType",
")",
"{",
"return",
"types",
".",
"BadRequestErrorf",
"(",
"\"Network type not supported: %s\"",
",",
"networkType",
")",
"\n",
"}",
"\n",
"d",
":=",
"newDriver",
"(",
"networkType",
")",
"\n",
"err",
":=",
"d",
".",
"initStore",
"(",
"config",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"return",
"dc",
".",
"RegisterDriver",
"(",
"networkType",
",",
"d",
",",
"driverapi",
".",
"Capability",
"{",
"DataScope",
":",
"datastore",
".",
"LocalScope",
",",
"ConnectivityScope",
":",
"datastore",
".",
"LocalScope",
",",
"}",
")",
"\n",
"}",
"\n",
"}"
] |
// GetInit returns an initializer for the given network type
|
[
"GetInit",
"returns",
"an",
"initializer",
"for",
"the",
"given",
"network",
"type"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/windows/windows.go#L127-L145
|
train
|
docker/libnetwork
|
drivers/windows/windows.go
|
ConvertPortBindings
|
func ConvertPortBindings(portBindings []types.PortBinding) ([]json.RawMessage, error) {
var pbs []json.RawMessage
// Enumerate through the port bindings specified by the user and convert
// them into the internal structure matching the JSON blob that can be
// understood by the HCS.
for _, elem := range portBindings {
proto := strings.ToUpper(elem.Proto.String())
if proto != "TCP" && proto != "UDP" {
return nil, fmt.Errorf("invalid protocol %s", elem.Proto.String())
}
if elem.HostPort != elem.HostPortEnd {
return nil, fmt.Errorf("Windows does not support more than one host port in NAT settings")
}
if len(elem.HostIP) != 0 {
return nil, fmt.Errorf("Windows does not support host IP addresses in NAT settings")
}
encodedPolicy, err := json.Marshal(hcsshim.NatPolicy{
Type: "NAT",
ExternalPort: elem.HostPort,
InternalPort: elem.Port,
Protocol: elem.Proto.String(),
})
if err != nil {
return nil, err
}
pbs = append(pbs, encodedPolicy)
}
return pbs, nil
}
|
go
|
func ConvertPortBindings(portBindings []types.PortBinding) ([]json.RawMessage, error) {
var pbs []json.RawMessage
// Enumerate through the port bindings specified by the user and convert
// them into the internal structure matching the JSON blob that can be
// understood by the HCS.
for _, elem := range portBindings {
proto := strings.ToUpper(elem.Proto.String())
if proto != "TCP" && proto != "UDP" {
return nil, fmt.Errorf("invalid protocol %s", elem.Proto.String())
}
if elem.HostPort != elem.HostPortEnd {
return nil, fmt.Errorf("Windows does not support more than one host port in NAT settings")
}
if len(elem.HostIP) != 0 {
return nil, fmt.Errorf("Windows does not support host IP addresses in NAT settings")
}
encodedPolicy, err := json.Marshal(hcsshim.NatPolicy{
Type: "NAT",
ExternalPort: elem.HostPort,
InternalPort: elem.Port,
Protocol: elem.Proto.String(),
})
if err != nil {
return nil, err
}
pbs = append(pbs, encodedPolicy)
}
return pbs, nil
}
|
[
"func",
"ConvertPortBindings",
"(",
"portBindings",
"[",
"]",
"types",
".",
"PortBinding",
")",
"(",
"[",
"]",
"json",
".",
"RawMessage",
",",
"error",
")",
"{",
"var",
"pbs",
"[",
"]",
"json",
".",
"RawMessage",
"\n",
"for",
"_",
",",
"elem",
":=",
"range",
"portBindings",
"{",
"proto",
":=",
"strings",
".",
"ToUpper",
"(",
"elem",
".",
"Proto",
".",
"String",
"(",
")",
")",
"\n",
"if",
"proto",
"!=",
"\"TCP\"",
"&&",
"proto",
"!=",
"\"UDP\"",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"invalid protocol %s\"",
",",
"elem",
".",
"Proto",
".",
"String",
"(",
")",
")",
"\n",
"}",
"\n",
"if",
"elem",
".",
"HostPort",
"!=",
"elem",
".",
"HostPortEnd",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"Windows does not support more than one host port in NAT settings\"",
")",
"\n",
"}",
"\n",
"if",
"len",
"(",
"elem",
".",
"HostIP",
")",
"!=",
"0",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"Windows does not support host IP addresses in NAT settings\"",
")",
"\n",
"}",
"\n",
"encodedPolicy",
",",
"err",
":=",
"json",
".",
"Marshal",
"(",
"hcsshim",
".",
"NatPolicy",
"{",
"Type",
":",
"\"NAT\"",
",",
"ExternalPort",
":",
"elem",
".",
"HostPort",
",",
"InternalPort",
":",
"elem",
".",
"Port",
",",
"Protocol",
":",
"elem",
".",
"Proto",
".",
"String",
"(",
")",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"pbs",
"=",
"append",
"(",
"pbs",
",",
"encodedPolicy",
")",
"\n",
"}",
"\n",
"return",
"pbs",
",",
"nil",
"\n",
"}"
] |
// ConvertPortBindings converts PortBindings to JSON for HNS request
|
[
"ConvertPortBindings",
"converts",
"PortBindings",
"to",
"JSON",
"for",
"HNS",
"request"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/windows/windows.go#L449-L482
|
train
|
docker/libnetwork
|
drivers/windows/windows.go
|
ParsePortBindingPolicies
|
func ParsePortBindingPolicies(policies []json.RawMessage) ([]types.PortBinding, error) {
var bindings []types.PortBinding
hcsPolicy := &hcsshim.NatPolicy{}
for _, elem := range policies {
if err := json.Unmarshal([]byte(elem), &hcsPolicy); err != nil || hcsPolicy.Type != "NAT" {
continue
}
binding := types.PortBinding{
HostPort: hcsPolicy.ExternalPort,
HostPortEnd: hcsPolicy.ExternalPort,
Port: hcsPolicy.InternalPort,
Proto: types.ParseProtocol(hcsPolicy.Protocol),
HostIP: net.IPv4(0, 0, 0, 0),
}
bindings = append(bindings, binding)
}
return bindings, nil
}
|
go
|
func ParsePortBindingPolicies(policies []json.RawMessage) ([]types.PortBinding, error) {
var bindings []types.PortBinding
hcsPolicy := &hcsshim.NatPolicy{}
for _, elem := range policies {
if err := json.Unmarshal([]byte(elem), &hcsPolicy); err != nil || hcsPolicy.Type != "NAT" {
continue
}
binding := types.PortBinding{
HostPort: hcsPolicy.ExternalPort,
HostPortEnd: hcsPolicy.ExternalPort,
Port: hcsPolicy.InternalPort,
Proto: types.ParseProtocol(hcsPolicy.Protocol),
HostIP: net.IPv4(0, 0, 0, 0),
}
bindings = append(bindings, binding)
}
return bindings, nil
}
|
[
"func",
"ParsePortBindingPolicies",
"(",
"policies",
"[",
"]",
"json",
".",
"RawMessage",
")",
"(",
"[",
"]",
"types",
".",
"PortBinding",
",",
"error",
")",
"{",
"var",
"bindings",
"[",
"]",
"types",
".",
"PortBinding",
"\n",
"hcsPolicy",
":=",
"&",
"hcsshim",
".",
"NatPolicy",
"{",
"}",
"\n",
"for",
"_",
",",
"elem",
":=",
"range",
"policies",
"{",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"[",
"]",
"byte",
"(",
"elem",
")",
",",
"&",
"hcsPolicy",
")",
";",
"err",
"!=",
"nil",
"||",
"hcsPolicy",
".",
"Type",
"!=",
"\"NAT\"",
"{",
"continue",
"\n",
"}",
"\n",
"binding",
":=",
"types",
".",
"PortBinding",
"{",
"HostPort",
":",
"hcsPolicy",
".",
"ExternalPort",
",",
"HostPortEnd",
":",
"hcsPolicy",
".",
"ExternalPort",
",",
"Port",
":",
"hcsPolicy",
".",
"InternalPort",
",",
"Proto",
":",
"types",
".",
"ParseProtocol",
"(",
"hcsPolicy",
".",
"Protocol",
")",
",",
"HostIP",
":",
"net",
".",
"IPv4",
"(",
"0",
",",
"0",
",",
"0",
",",
"0",
")",
",",
"}",
"\n",
"bindings",
"=",
"append",
"(",
"bindings",
",",
"binding",
")",
"\n",
"}",
"\n",
"return",
"bindings",
",",
"nil",
"\n",
"}"
] |
// ParsePortBindingPolicies parses HNS endpoint response message to PortBindings
|
[
"ParsePortBindingPolicies",
"parses",
"HNS",
"endpoint",
"response",
"message",
"to",
"PortBindings"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/windows/windows.go#L485-L507
|
train
|
docker/libnetwork
|
drivers/windows/windows.go
|
ParseEndpointConnectivity
|
func ParseEndpointConnectivity(epOptions map[string]interface{}) (*EndpointConnectivity, error) {
if epOptions == nil {
return nil, nil
}
ec := &EndpointConnectivity{}
if opt, ok := epOptions[netlabel.PortMap]; ok {
if bs, ok := opt.([]types.PortBinding); ok {
ec.PortBindings = bs
} else {
return nil, fmt.Errorf("Invalid endpoint configuration")
}
}
if opt, ok := epOptions[netlabel.ExposedPorts]; ok {
if ports, ok := opt.([]types.TransportPort); ok {
ec.ExposedPorts = ports
} else {
return nil, fmt.Errorf("Invalid endpoint configuration")
}
}
return ec, nil
}
|
go
|
func ParseEndpointConnectivity(epOptions map[string]interface{}) (*EndpointConnectivity, error) {
if epOptions == nil {
return nil, nil
}
ec := &EndpointConnectivity{}
if opt, ok := epOptions[netlabel.PortMap]; ok {
if bs, ok := opt.([]types.PortBinding); ok {
ec.PortBindings = bs
} else {
return nil, fmt.Errorf("Invalid endpoint configuration")
}
}
if opt, ok := epOptions[netlabel.ExposedPorts]; ok {
if ports, ok := opt.([]types.TransportPort); ok {
ec.ExposedPorts = ports
} else {
return nil, fmt.Errorf("Invalid endpoint configuration")
}
}
return ec, nil
}
|
[
"func",
"ParseEndpointConnectivity",
"(",
"epOptions",
"map",
"[",
"string",
"]",
"interface",
"{",
"}",
")",
"(",
"*",
"EndpointConnectivity",
",",
"error",
")",
"{",
"if",
"epOptions",
"==",
"nil",
"{",
"return",
"nil",
",",
"nil",
"\n",
"}",
"\n",
"ec",
":=",
"&",
"EndpointConnectivity",
"{",
"}",
"\n",
"if",
"opt",
",",
"ok",
":=",
"epOptions",
"[",
"netlabel",
".",
"PortMap",
"]",
";",
"ok",
"{",
"if",
"bs",
",",
"ok",
":=",
"opt",
".",
"(",
"[",
"]",
"types",
".",
"PortBinding",
")",
";",
"ok",
"{",
"ec",
".",
"PortBindings",
"=",
"bs",
"\n",
"}",
"else",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"Invalid endpoint configuration\"",
")",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"opt",
",",
"ok",
":=",
"epOptions",
"[",
"netlabel",
".",
"ExposedPorts",
"]",
";",
"ok",
"{",
"if",
"ports",
",",
"ok",
":=",
"opt",
".",
"(",
"[",
"]",
"types",
".",
"TransportPort",
")",
";",
"ok",
"{",
"ec",
".",
"ExposedPorts",
"=",
"ports",
"\n",
"}",
"else",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"Invalid endpoint configuration\"",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"ec",
",",
"nil",
"\n",
"}"
] |
// ParseEndpointConnectivity parses options passed to CreateEndpoint, specifically port bindings, and store in a endpointConnectivity object.
|
[
"ParseEndpointConnectivity",
"parses",
"options",
"passed",
"to",
"CreateEndpoint",
"specifically",
"port",
"bindings",
"and",
"store",
"in",
"a",
"endpointConnectivity",
"object",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/windows/windows.go#L560-L583
|
train
|
docker/libnetwork
|
service_common.go
|
cleanupServiceDiscovery
|
func (c *controller) cleanupServiceDiscovery(cleanupNID string) {
c.Lock()
defer c.Unlock()
if cleanupNID == "" {
logrus.Debugf("cleanupServiceDiscovery for all networks")
c.svcRecords = make(map[string]svcInfo)
return
}
logrus.Debugf("cleanupServiceDiscovery for network:%s", cleanupNID)
delete(c.svcRecords, cleanupNID)
}
|
go
|
func (c *controller) cleanupServiceDiscovery(cleanupNID string) {
c.Lock()
defer c.Unlock()
if cleanupNID == "" {
logrus.Debugf("cleanupServiceDiscovery for all networks")
c.svcRecords = make(map[string]svcInfo)
return
}
logrus.Debugf("cleanupServiceDiscovery for network:%s", cleanupNID)
delete(c.svcRecords, cleanupNID)
}
|
[
"func",
"(",
"c",
"*",
"controller",
")",
"cleanupServiceDiscovery",
"(",
"cleanupNID",
"string",
")",
"{",
"c",
".",
"Lock",
"(",
")",
"\n",
"defer",
"c",
".",
"Unlock",
"(",
")",
"\n",
"if",
"cleanupNID",
"==",
"\"\"",
"{",
"logrus",
".",
"Debugf",
"(",
"\"cleanupServiceDiscovery for all networks\"",
")",
"\n",
"c",
".",
"svcRecords",
"=",
"make",
"(",
"map",
"[",
"string",
"]",
"svcInfo",
")",
"\n",
"return",
"\n",
"}",
"\n",
"logrus",
".",
"Debugf",
"(",
"\"cleanupServiceDiscovery for network:%s\"",
",",
"cleanupNID",
")",
"\n",
"delete",
"(",
"c",
".",
"svcRecords",
",",
"cleanupNID",
")",
"\n",
"}"
] |
// cleanupServiceDiscovery when the network is being deleted, erase all the associated service discovery records
|
[
"cleanupServiceDiscovery",
"when",
"the",
"network",
"is",
"being",
"deleted",
"erase",
"all",
"the",
"associated",
"service",
"discovery",
"records"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/service_common.go#L167-L177
|
train
|
docker/libnetwork
|
drivers/bridge/setup_bridgenetfiltering.go
|
getKernelBoolParam
|
func getKernelBoolParam(path string) (bool, error) {
enabled := false
line, err := ioutil.ReadFile(path)
if err != nil {
return false, err
}
if len(line) > 0 {
enabled = line[0] == '1'
}
return enabled, err
}
|
go
|
func getKernelBoolParam(path string) (bool, error) {
enabled := false
line, err := ioutil.ReadFile(path)
if err != nil {
return false, err
}
if len(line) > 0 {
enabled = line[0] == '1'
}
return enabled, err
}
|
[
"func",
"getKernelBoolParam",
"(",
"path",
"string",
")",
"(",
"bool",
",",
"error",
")",
"{",
"enabled",
":=",
"false",
"\n",
"line",
",",
"err",
":=",
"ioutil",
".",
"ReadFile",
"(",
"path",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"err",
"\n",
"}",
"\n",
"if",
"len",
"(",
"line",
")",
">",
"0",
"{",
"enabled",
"=",
"line",
"[",
"0",
"]",
"==",
"'1'",
"\n",
"}",
"\n",
"return",
"enabled",
",",
"err",
"\n",
"}"
] |
//Gets the value of the kernel parameters located at the given path
|
[
"Gets",
"the",
"value",
"of",
"the",
"kernel",
"parameters",
"located",
"at",
"the",
"given",
"path"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/bridge/setup_bridgenetfiltering.go#L123-L133
|
train
|
docker/libnetwork
|
drivers/bridge/setup_bridgenetfiltering.go
|
setKernelBoolParam
|
func setKernelBoolParam(path string, on bool) error {
value := byte('0')
if on {
value = byte('1')
}
return ioutil.WriteFile(path, []byte{value, '\n'}, 0644)
}
|
go
|
func setKernelBoolParam(path string, on bool) error {
value := byte('0')
if on {
value = byte('1')
}
return ioutil.WriteFile(path, []byte{value, '\n'}, 0644)
}
|
[
"func",
"setKernelBoolParam",
"(",
"path",
"string",
",",
"on",
"bool",
")",
"error",
"{",
"value",
":=",
"byte",
"(",
"'0'",
")",
"\n",
"if",
"on",
"{",
"value",
"=",
"byte",
"(",
"'1'",
")",
"\n",
"}",
"\n",
"return",
"ioutil",
".",
"WriteFile",
"(",
"path",
",",
"[",
"]",
"byte",
"{",
"value",
",",
"'\\n'",
"}",
",",
"0644",
")",
"\n",
"}"
] |
//Sets the value of the kernel parameter located at the given path
|
[
"Sets",
"the",
"value",
"of",
"the",
"kernel",
"parameter",
"located",
"at",
"the",
"given",
"path"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/bridge/setup_bridgenetfiltering.go#L136-L142
|
train
|
docker/libnetwork
|
drivers/bridge/setup_bridgenetfiltering.go
|
isPacketForwardingEnabled
|
func isPacketForwardingEnabled(ipVer ipVersion, iface string) (bool, error) {
switch ipVer {
case ipv4, ipv6:
return getKernelBoolParam(getForwardingKernelParam(ipVer, iface))
case ipvboth:
enabled, err := getKernelBoolParam(getForwardingKernelParam(ipv4, ""))
if err != nil || !enabled {
return enabled, err
}
return getKernelBoolParam(getForwardingKernelParam(ipv6, iface))
default:
return true, nil
}
}
|
go
|
func isPacketForwardingEnabled(ipVer ipVersion, iface string) (bool, error) {
switch ipVer {
case ipv4, ipv6:
return getKernelBoolParam(getForwardingKernelParam(ipVer, iface))
case ipvboth:
enabled, err := getKernelBoolParam(getForwardingKernelParam(ipv4, ""))
if err != nil || !enabled {
return enabled, err
}
return getKernelBoolParam(getForwardingKernelParam(ipv6, iface))
default:
return true, nil
}
}
|
[
"func",
"isPacketForwardingEnabled",
"(",
"ipVer",
"ipVersion",
",",
"iface",
"string",
")",
"(",
"bool",
",",
"error",
")",
"{",
"switch",
"ipVer",
"{",
"case",
"ipv4",
",",
"ipv6",
":",
"return",
"getKernelBoolParam",
"(",
"getForwardingKernelParam",
"(",
"ipVer",
",",
"iface",
")",
")",
"\n",
"case",
"ipvboth",
":",
"enabled",
",",
"err",
":=",
"getKernelBoolParam",
"(",
"getForwardingKernelParam",
"(",
"ipv4",
",",
"\"\"",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"||",
"!",
"enabled",
"{",
"return",
"enabled",
",",
"err",
"\n",
"}",
"\n",
"return",
"getKernelBoolParam",
"(",
"getForwardingKernelParam",
"(",
"ipv6",
",",
"iface",
")",
")",
"\n",
"default",
":",
"return",
"true",
",",
"nil",
"\n",
"}",
"\n",
"}"
] |
//Checks to see if packet forwarding is enabled
|
[
"Checks",
"to",
"see",
"if",
"packet",
"forwarding",
"is",
"enabled"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/bridge/setup_bridgenetfiltering.go#L145-L158
|
train
|
docker/libnetwork
|
endpoint.go
|
isServiceEnabled
|
func (ep *endpoint) isServiceEnabled() bool {
ep.Lock()
defer ep.Unlock()
return ep.serviceEnabled
}
|
go
|
func (ep *endpoint) isServiceEnabled() bool {
ep.Lock()
defer ep.Unlock()
return ep.serviceEnabled
}
|
[
"func",
"(",
"ep",
"*",
"endpoint",
")",
"isServiceEnabled",
"(",
")",
"bool",
"{",
"ep",
".",
"Lock",
"(",
")",
"\n",
"defer",
"ep",
".",
"Unlock",
"(",
")",
"\n",
"return",
"ep",
".",
"serviceEnabled",
"\n",
"}"
] |
// isServiceEnabled check if service is enabled on the endpoint
|
[
"isServiceEnabled",
"check",
"if",
"service",
"is",
"enabled",
"on",
"the",
"endpoint"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/endpoint.go#L314-L318
|
train
|
docker/libnetwork
|
endpoint.go
|
enableService
|
func (ep *endpoint) enableService() {
ep.Lock()
defer ep.Unlock()
ep.serviceEnabled = true
}
|
go
|
func (ep *endpoint) enableService() {
ep.Lock()
defer ep.Unlock()
ep.serviceEnabled = true
}
|
[
"func",
"(",
"ep",
"*",
"endpoint",
")",
"enableService",
"(",
")",
"{",
"ep",
".",
"Lock",
"(",
")",
"\n",
"defer",
"ep",
".",
"Unlock",
"(",
")",
"\n",
"ep",
".",
"serviceEnabled",
"=",
"true",
"\n",
"}"
] |
// enableService sets service enabled on the endpoint
|
[
"enableService",
"sets",
"service",
"enabled",
"on",
"the",
"endpoint"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/endpoint.go#L321-L325
|
train
|
docker/libnetwork
|
endpoint.go
|
disableService
|
func (ep *endpoint) disableService() {
ep.Lock()
defer ep.Unlock()
ep.serviceEnabled = false
}
|
go
|
func (ep *endpoint) disableService() {
ep.Lock()
defer ep.Unlock()
ep.serviceEnabled = false
}
|
[
"func",
"(",
"ep",
"*",
"endpoint",
")",
"disableService",
"(",
")",
"{",
"ep",
".",
"Lock",
"(",
")",
"\n",
"defer",
"ep",
".",
"Unlock",
"(",
")",
"\n",
"ep",
".",
"serviceEnabled",
"=",
"false",
"\n",
"}"
] |
// disableService disables service on the endpoint
|
[
"disableService",
"disables",
"service",
"on",
"the",
"endpoint"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/endpoint.go#L328-L332
|
train
|
docker/libnetwork
|
endpoint.go
|
EndpointOptionGeneric
|
func EndpointOptionGeneric(generic map[string]interface{}) EndpointOption {
return func(ep *endpoint) {
for k, v := range generic {
ep.generic[k] = v
}
}
}
|
go
|
func EndpointOptionGeneric(generic map[string]interface{}) EndpointOption {
return func(ep *endpoint) {
for k, v := range generic {
ep.generic[k] = v
}
}
}
|
[
"func",
"EndpointOptionGeneric",
"(",
"generic",
"map",
"[",
"string",
"]",
"interface",
"{",
"}",
")",
"EndpointOption",
"{",
"return",
"func",
"(",
"ep",
"*",
"endpoint",
")",
"{",
"for",
"k",
",",
"v",
":=",
"range",
"generic",
"{",
"ep",
".",
"generic",
"[",
"k",
"]",
"=",
"v",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] |
// EndpointOptionGeneric function returns an option setter for a Generic option defined
// in a Dictionary of Key-Value pair
|
[
"EndpointOptionGeneric",
"function",
"returns",
"an",
"option",
"setter",
"for",
"a",
"Generic",
"option",
"defined",
"in",
"a",
"Dictionary",
"of",
"Key",
"-",
"Value",
"pair"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/endpoint.go#L928-L934
|
train
|
docker/libnetwork
|
endpoint.go
|
CreateOptionIpam
|
func CreateOptionIpam(ipV4, ipV6 net.IP, llIPs []net.IP, ipamOptions map[string]string) EndpointOption {
return func(ep *endpoint) {
ep.prefAddress = ipV4
ep.prefAddressV6 = ipV6
if len(llIPs) != 0 {
for _, ip := range llIPs {
nw := &net.IPNet{IP: ip, Mask: linkLocalMask}
if ip.To4() == nil {
nw.Mask = linkLocalMaskIPv6
}
ep.iface.llAddrs = append(ep.iface.llAddrs, nw)
}
}
ep.ipamOptions = ipamOptions
}
}
|
go
|
func CreateOptionIpam(ipV4, ipV6 net.IP, llIPs []net.IP, ipamOptions map[string]string) EndpointOption {
return func(ep *endpoint) {
ep.prefAddress = ipV4
ep.prefAddressV6 = ipV6
if len(llIPs) != 0 {
for _, ip := range llIPs {
nw := &net.IPNet{IP: ip, Mask: linkLocalMask}
if ip.To4() == nil {
nw.Mask = linkLocalMaskIPv6
}
ep.iface.llAddrs = append(ep.iface.llAddrs, nw)
}
}
ep.ipamOptions = ipamOptions
}
}
|
[
"func",
"CreateOptionIpam",
"(",
"ipV4",
",",
"ipV6",
"net",
".",
"IP",
",",
"llIPs",
"[",
"]",
"net",
".",
"IP",
",",
"ipamOptions",
"map",
"[",
"string",
"]",
"string",
")",
"EndpointOption",
"{",
"return",
"func",
"(",
"ep",
"*",
"endpoint",
")",
"{",
"ep",
".",
"prefAddress",
"=",
"ipV4",
"\n",
"ep",
".",
"prefAddressV6",
"=",
"ipV6",
"\n",
"if",
"len",
"(",
"llIPs",
")",
"!=",
"0",
"{",
"for",
"_",
",",
"ip",
":=",
"range",
"llIPs",
"{",
"nw",
":=",
"&",
"net",
".",
"IPNet",
"{",
"IP",
":",
"ip",
",",
"Mask",
":",
"linkLocalMask",
"}",
"\n",
"if",
"ip",
".",
"To4",
"(",
")",
"==",
"nil",
"{",
"nw",
".",
"Mask",
"=",
"linkLocalMaskIPv6",
"\n",
"}",
"\n",
"ep",
".",
"iface",
".",
"llAddrs",
"=",
"append",
"(",
"ep",
".",
"iface",
".",
"llAddrs",
",",
"nw",
")",
"\n",
"}",
"\n",
"}",
"\n",
"ep",
".",
"ipamOptions",
"=",
"ipamOptions",
"\n",
"}",
"\n",
"}"
] |
// CreateOptionIpam function returns an option setter for the ipam configuration for this endpoint
|
[
"CreateOptionIpam",
"function",
"returns",
"an",
"option",
"setter",
"for",
"the",
"ipam",
"configuration",
"for",
"this",
"endpoint"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/endpoint.go#L942-L957
|
train
|
docker/libnetwork
|
endpoint.go
|
CreateOptionDNS
|
func CreateOptionDNS(dns []string) EndpointOption {
return func(ep *endpoint) {
ep.generic[netlabel.DNSServers] = dns
}
}
|
go
|
func CreateOptionDNS(dns []string) EndpointOption {
return func(ep *endpoint) {
ep.generic[netlabel.DNSServers] = dns
}
}
|
[
"func",
"CreateOptionDNS",
"(",
"dns",
"[",
"]",
"string",
")",
"EndpointOption",
"{",
"return",
"func",
"(",
"ep",
"*",
"endpoint",
")",
"{",
"ep",
".",
"generic",
"[",
"netlabel",
".",
"DNSServers",
"]",
"=",
"dns",
"\n",
"}",
"\n",
"}"
] |
// CreateOptionDNS function returns an option setter for dns entry option to
// be passed to container Create method.
|
[
"CreateOptionDNS",
"function",
"returns",
"an",
"option",
"setter",
"for",
"dns",
"entry",
"option",
"to",
"be",
"passed",
"to",
"container",
"Create",
"method",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/endpoint.go#L985-L989
|
train
|
docker/libnetwork
|
endpoint.go
|
CreateOptionAlias
|
func CreateOptionAlias(name string, alias string) EndpointOption {
return func(ep *endpoint) {
if ep.aliases == nil {
ep.aliases = make(map[string]string)
}
ep.aliases[alias] = name
}
}
|
go
|
func CreateOptionAlias(name string, alias string) EndpointOption {
return func(ep *endpoint) {
if ep.aliases == nil {
ep.aliases = make(map[string]string)
}
ep.aliases[alias] = name
}
}
|
[
"func",
"CreateOptionAlias",
"(",
"name",
"string",
",",
"alias",
"string",
")",
"EndpointOption",
"{",
"return",
"func",
"(",
"ep",
"*",
"endpoint",
")",
"{",
"if",
"ep",
".",
"aliases",
"==",
"nil",
"{",
"ep",
".",
"aliases",
"=",
"make",
"(",
"map",
"[",
"string",
"]",
"string",
")",
"\n",
"}",
"\n",
"ep",
".",
"aliases",
"[",
"alias",
"]",
"=",
"name",
"\n",
"}",
"\n",
"}"
] |
// CreateOptionAlias function returns an option setter for setting endpoint alias
|
[
"CreateOptionAlias",
"function",
"returns",
"an",
"option",
"setter",
"for",
"setting",
"endpoint",
"alias"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/endpoint.go#L1008-L1015
|
train
|
docker/libnetwork
|
endpoint.go
|
CreateOptionService
|
func CreateOptionService(name, id string, vip net.IP, ingressPorts []*PortConfig, aliases []string) EndpointOption {
return func(ep *endpoint) {
ep.svcName = name
ep.svcID = id
ep.virtualIP = vip
ep.ingressPorts = ingressPorts
ep.svcAliases = aliases
}
}
|
go
|
func CreateOptionService(name, id string, vip net.IP, ingressPorts []*PortConfig, aliases []string) EndpointOption {
return func(ep *endpoint) {
ep.svcName = name
ep.svcID = id
ep.virtualIP = vip
ep.ingressPorts = ingressPorts
ep.svcAliases = aliases
}
}
|
[
"func",
"CreateOptionService",
"(",
"name",
",",
"id",
"string",
",",
"vip",
"net",
".",
"IP",
",",
"ingressPorts",
"[",
"]",
"*",
"PortConfig",
",",
"aliases",
"[",
"]",
"string",
")",
"EndpointOption",
"{",
"return",
"func",
"(",
"ep",
"*",
"endpoint",
")",
"{",
"ep",
".",
"svcName",
"=",
"name",
"\n",
"ep",
".",
"svcID",
"=",
"id",
"\n",
"ep",
".",
"virtualIP",
"=",
"vip",
"\n",
"ep",
".",
"ingressPorts",
"=",
"ingressPorts",
"\n",
"ep",
".",
"svcAliases",
"=",
"aliases",
"\n",
"}",
"\n",
"}"
] |
// CreateOptionService function returns an option setter for setting service binding configuration
|
[
"CreateOptionService",
"function",
"returns",
"an",
"option",
"setter",
"for",
"setting",
"service",
"binding",
"configuration"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/endpoint.go#L1018-L1026
|
train
|
docker/libnetwork
|
endpoint.go
|
CreateOptionMyAlias
|
func CreateOptionMyAlias(alias string) EndpointOption {
return func(ep *endpoint) {
ep.myAliases = append(ep.myAliases, alias)
}
}
|
go
|
func CreateOptionMyAlias(alias string) EndpointOption {
return func(ep *endpoint) {
ep.myAliases = append(ep.myAliases, alias)
}
}
|
[
"func",
"CreateOptionMyAlias",
"(",
"alias",
"string",
")",
"EndpointOption",
"{",
"return",
"func",
"(",
"ep",
"*",
"endpoint",
")",
"{",
"ep",
".",
"myAliases",
"=",
"append",
"(",
"ep",
".",
"myAliases",
",",
"alias",
")",
"\n",
"}",
"\n",
"}"
] |
// CreateOptionMyAlias function returns an option setter for setting endpoint's self alias
|
[
"CreateOptionMyAlias",
"function",
"returns",
"an",
"option",
"setter",
"for",
"setting",
"endpoint",
"s",
"self",
"alias"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/endpoint.go#L1029-L1033
|
train
|
docker/libnetwork
|
iptables/conntrack.go
|
DeleteConntrackEntries
|
func DeleteConntrackEntries(nlh *netlink.Handle, ipv4List []net.IP, ipv6List []net.IP) (uint, uint, error) {
if !IsConntrackProgrammable(nlh) {
return 0, 0, ErrConntrackNotConfigurable
}
var totalIPv4FlowPurged uint
for _, ipAddress := range ipv4List {
flowPurged, err := purgeConntrackState(nlh, syscall.AF_INET, ipAddress)
if err != nil {
logrus.Warnf("Failed to delete conntrack state for %s: %v", ipAddress, err)
continue
}
totalIPv4FlowPurged += flowPurged
}
var totalIPv6FlowPurged uint
for _, ipAddress := range ipv6List {
flowPurged, err := purgeConntrackState(nlh, syscall.AF_INET6, ipAddress)
if err != nil {
logrus.Warnf("Failed to delete conntrack state for %s: %v", ipAddress, err)
continue
}
totalIPv6FlowPurged += flowPurged
}
logrus.Debugf("DeleteConntrackEntries purged ipv4:%d, ipv6:%d", totalIPv4FlowPurged, totalIPv6FlowPurged)
return totalIPv4FlowPurged, totalIPv6FlowPurged, nil
}
|
go
|
func DeleteConntrackEntries(nlh *netlink.Handle, ipv4List []net.IP, ipv6List []net.IP) (uint, uint, error) {
if !IsConntrackProgrammable(nlh) {
return 0, 0, ErrConntrackNotConfigurable
}
var totalIPv4FlowPurged uint
for _, ipAddress := range ipv4List {
flowPurged, err := purgeConntrackState(nlh, syscall.AF_INET, ipAddress)
if err != nil {
logrus.Warnf("Failed to delete conntrack state for %s: %v", ipAddress, err)
continue
}
totalIPv4FlowPurged += flowPurged
}
var totalIPv6FlowPurged uint
for _, ipAddress := range ipv6List {
flowPurged, err := purgeConntrackState(nlh, syscall.AF_INET6, ipAddress)
if err != nil {
logrus.Warnf("Failed to delete conntrack state for %s: %v", ipAddress, err)
continue
}
totalIPv6FlowPurged += flowPurged
}
logrus.Debugf("DeleteConntrackEntries purged ipv4:%d, ipv6:%d", totalIPv4FlowPurged, totalIPv6FlowPurged)
return totalIPv4FlowPurged, totalIPv6FlowPurged, nil
}
|
[
"func",
"DeleteConntrackEntries",
"(",
"nlh",
"*",
"netlink",
".",
"Handle",
",",
"ipv4List",
"[",
"]",
"net",
".",
"IP",
",",
"ipv6List",
"[",
"]",
"net",
".",
"IP",
")",
"(",
"uint",
",",
"uint",
",",
"error",
")",
"{",
"if",
"!",
"IsConntrackProgrammable",
"(",
"nlh",
")",
"{",
"return",
"0",
",",
"0",
",",
"ErrConntrackNotConfigurable",
"\n",
"}",
"\n",
"var",
"totalIPv4FlowPurged",
"uint",
"\n",
"for",
"_",
",",
"ipAddress",
":=",
"range",
"ipv4List",
"{",
"flowPurged",
",",
"err",
":=",
"purgeConntrackState",
"(",
"nlh",
",",
"syscall",
".",
"AF_INET",
",",
"ipAddress",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Warnf",
"(",
"\"Failed to delete conntrack state for %s: %v\"",
",",
"ipAddress",
",",
"err",
")",
"\n",
"continue",
"\n",
"}",
"\n",
"totalIPv4FlowPurged",
"+=",
"flowPurged",
"\n",
"}",
"\n",
"var",
"totalIPv6FlowPurged",
"uint",
"\n",
"for",
"_",
",",
"ipAddress",
":=",
"range",
"ipv6List",
"{",
"flowPurged",
",",
"err",
":=",
"purgeConntrackState",
"(",
"nlh",
",",
"syscall",
".",
"AF_INET6",
",",
"ipAddress",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Warnf",
"(",
"\"Failed to delete conntrack state for %s: %v\"",
",",
"ipAddress",
",",
"err",
")",
"\n",
"continue",
"\n",
"}",
"\n",
"totalIPv6FlowPurged",
"+=",
"flowPurged",
"\n",
"}",
"\n",
"logrus",
".",
"Debugf",
"(",
"\"DeleteConntrackEntries purged ipv4:%d, ipv6:%d\"",
",",
"totalIPv4FlowPurged",
",",
"totalIPv6FlowPurged",
")",
"\n",
"return",
"totalIPv4FlowPurged",
",",
"totalIPv6FlowPurged",
",",
"nil",
"\n",
"}"
] |
// DeleteConntrackEntries deletes all the conntrack connections on the host for the specified IP
// Returns the number of flows deleted for IPv4, IPv6 else error
|
[
"DeleteConntrackEntries",
"deletes",
"all",
"the",
"conntrack",
"connections",
"on",
"the",
"host",
"for",
"the",
"specified",
"IP",
"Returns",
"the",
"number",
"of",
"flows",
"deleted",
"for",
"IPv4",
"IPv6",
"else",
"error"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/iptables/conntrack.go#L24-L51
|
train
|
docker/libnetwork
|
client/service.go
|
CmdServicePublish
|
func (cli *NetworkCli) CmdServicePublish(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "publish", "SERVICE[.NETWORK]", "Publish a new service on a network", false)
flAlias := opts.NewListOpts(netutils.ValidateAlias)
cmd.Var(&flAlias, []string{"-alias"}, "Add alias to self")
cmd.Require(flag.Exact, 1)
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
sn, nn := parseServiceName(cmd.Arg(0))
sc := serviceCreate{Name: sn, Network: nn, MyAliases: flAlias.GetAll()}
obj, _, err := readBody(cli.call("POST", "/services", sc, nil))
if err != nil {
return err
}
var replyID string
err = json.Unmarshal(obj, &replyID)
if err != nil {
return err
}
fmt.Fprintf(cli.out, "%s\n", replyID)
return nil
}
|
go
|
func (cli *NetworkCli) CmdServicePublish(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "publish", "SERVICE[.NETWORK]", "Publish a new service on a network", false)
flAlias := opts.NewListOpts(netutils.ValidateAlias)
cmd.Var(&flAlias, []string{"-alias"}, "Add alias to self")
cmd.Require(flag.Exact, 1)
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
sn, nn := parseServiceName(cmd.Arg(0))
sc := serviceCreate{Name: sn, Network: nn, MyAliases: flAlias.GetAll()}
obj, _, err := readBody(cli.call("POST", "/services", sc, nil))
if err != nil {
return err
}
var replyID string
err = json.Unmarshal(obj, &replyID)
if err != nil {
return err
}
fmt.Fprintf(cli.out, "%s\n", replyID)
return nil
}
|
[
"func",
"(",
"cli",
"*",
"NetworkCli",
")",
"CmdServicePublish",
"(",
"chain",
"string",
",",
"args",
"...",
"string",
")",
"error",
"{",
"cmd",
":=",
"cli",
".",
"Subcmd",
"(",
"chain",
",",
"\"publish\"",
",",
"\"SERVICE[.NETWORK]\"",
",",
"\"Publish a new service on a network\"",
",",
"false",
")",
"\n",
"flAlias",
":=",
"opts",
".",
"NewListOpts",
"(",
"netutils",
".",
"ValidateAlias",
")",
"\n",
"cmd",
".",
"Var",
"(",
"&",
"flAlias",
",",
"[",
"]",
"string",
"{",
"\"-alias\"",
"}",
",",
"\"Add alias to self\"",
")",
"\n",
"cmd",
".",
"Require",
"(",
"flag",
".",
"Exact",
",",
"1",
")",
"\n",
"err",
":=",
"cmd",
".",
"ParseFlags",
"(",
"args",
",",
"true",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"sn",
",",
"nn",
":=",
"parseServiceName",
"(",
"cmd",
".",
"Arg",
"(",
"0",
")",
")",
"\n",
"sc",
":=",
"serviceCreate",
"{",
"Name",
":",
"sn",
",",
"Network",
":",
"nn",
",",
"MyAliases",
":",
"flAlias",
".",
"GetAll",
"(",
")",
"}",
"\n",
"obj",
",",
"_",
",",
"err",
":=",
"readBody",
"(",
"cli",
".",
"call",
"(",
"\"POST\"",
",",
"\"/services\"",
",",
"sc",
",",
"nil",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"var",
"replyID",
"string",
"\n",
"err",
"=",
"json",
".",
"Unmarshal",
"(",
"obj",
",",
"&",
"replyID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"fmt",
".",
"Fprintf",
"(",
"cli",
".",
"out",
",",
"\"%s\\n\"",
",",
"\\n",
")",
"\n",
"replyID",
"\n",
"}"
] |
// CmdServicePublish handles service create UI
|
[
"CmdServicePublish",
"handles",
"service",
"create",
"UI"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/client/service.go#L165-L190
|
train
|
docker/libnetwork
|
client/service.go
|
CmdServiceUnpublish
|
func (cli *NetworkCli) CmdServiceUnpublish(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "unpublish", "SERVICE[.NETWORK]", "Removes a service", false)
force := cmd.Bool([]string{"f", "-force"}, false, "force unpublish service")
cmd.Require(flag.Exact, 1)
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
sn, nn := parseServiceName(cmd.Arg(0))
serviceID, err := lookupServiceID(cli, nn, sn)
if err != nil {
return err
}
sd := serviceDelete{Name: sn, Force: *force}
_, _, err = readBody(cli.call("DELETE", "/services/"+serviceID, sd, nil))
return err
}
|
go
|
func (cli *NetworkCli) CmdServiceUnpublish(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "unpublish", "SERVICE[.NETWORK]", "Removes a service", false)
force := cmd.Bool([]string{"f", "-force"}, false, "force unpublish service")
cmd.Require(flag.Exact, 1)
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
sn, nn := parseServiceName(cmd.Arg(0))
serviceID, err := lookupServiceID(cli, nn, sn)
if err != nil {
return err
}
sd := serviceDelete{Name: sn, Force: *force}
_, _, err = readBody(cli.call("DELETE", "/services/"+serviceID, sd, nil))
return err
}
|
[
"func",
"(",
"cli",
"*",
"NetworkCli",
")",
"CmdServiceUnpublish",
"(",
"chain",
"string",
",",
"args",
"...",
"string",
")",
"error",
"{",
"cmd",
":=",
"cli",
".",
"Subcmd",
"(",
"chain",
",",
"\"unpublish\"",
",",
"\"SERVICE[.NETWORK]\"",
",",
"\"Removes a service\"",
",",
"false",
")",
"\n",
"force",
":=",
"cmd",
".",
"Bool",
"(",
"[",
"]",
"string",
"{",
"\"f\"",
",",
"\"-force\"",
"}",
",",
"false",
",",
"\"force unpublish service\"",
")",
"\n",
"cmd",
".",
"Require",
"(",
"flag",
".",
"Exact",
",",
"1",
")",
"\n",
"err",
":=",
"cmd",
".",
"ParseFlags",
"(",
"args",
",",
"true",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"sn",
",",
"nn",
":=",
"parseServiceName",
"(",
"cmd",
".",
"Arg",
"(",
"0",
")",
")",
"\n",
"serviceID",
",",
"err",
":=",
"lookupServiceID",
"(",
"cli",
",",
"nn",
",",
"sn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"sd",
":=",
"serviceDelete",
"{",
"Name",
":",
"sn",
",",
"Force",
":",
"*",
"force",
"}",
"\n",
"_",
",",
"_",
",",
"err",
"=",
"readBody",
"(",
"cli",
".",
"call",
"(",
"\"DELETE\"",
",",
"\"/services/\"",
"+",
"serviceID",
",",
"sd",
",",
"nil",
")",
")",
"\n",
"return",
"err",
"\n",
"}"
] |
// CmdServiceUnpublish handles service delete UI
|
[
"CmdServiceUnpublish",
"handles",
"service",
"delete",
"UI"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/client/service.go#L193-L212
|
train
|
docker/libnetwork
|
client/service.go
|
CmdServiceLs
|
func (cli *NetworkCli) CmdServiceLs(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "ls", "SERVICE", "Lists all the services on a network", false)
flNetwork := cmd.String([]string{"net", "-network"}, "", "Only show the services that are published on the specified network")
quiet := cmd.Bool([]string{"q", "-quiet"}, false, "Only display numeric IDs")
noTrunc := cmd.Bool([]string{"#notrunc", "-no-trunc"}, false, "Do not truncate the output")
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
var obj []byte
if *flNetwork == "" {
obj, _, err = readBody(cli.call("GET", "/services", nil, nil))
} else {
obj, _, err = readBody(cli.call("GET", "/services?network="+*flNetwork, nil, nil))
}
if err != nil {
return err
}
var serviceResources []serviceResource
err = json.Unmarshal(obj, &serviceResources)
if err != nil {
fmt.Println(err)
return err
}
wr := tabwriter.NewWriter(cli.out, 20, 1, 3, ' ', 0)
// unless quiet (-q) is specified, print field titles
if !*quiet {
fmt.Fprintln(wr, "SERVICE ID\tNAME\tNETWORK\tCONTAINER\tSANDBOX")
}
for _, sr := range serviceResources {
ID := sr.ID
bkID, sbID, err := getBackendID(cli, ID)
if err != nil {
return err
}
if !*noTrunc {
ID = stringid.TruncateID(ID)
bkID = stringid.TruncateID(bkID)
sbID = stringid.TruncateID(sbID)
}
if !*quiet {
fmt.Fprintf(wr, "%s\t%s\t%s\t%s\t%s\n", ID, sr.Name, sr.Network, bkID, sbID)
} else {
fmt.Fprintln(wr, ID)
}
}
wr.Flush()
return nil
}
|
go
|
func (cli *NetworkCli) CmdServiceLs(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "ls", "SERVICE", "Lists all the services on a network", false)
flNetwork := cmd.String([]string{"net", "-network"}, "", "Only show the services that are published on the specified network")
quiet := cmd.Bool([]string{"q", "-quiet"}, false, "Only display numeric IDs")
noTrunc := cmd.Bool([]string{"#notrunc", "-no-trunc"}, false, "Do not truncate the output")
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
var obj []byte
if *flNetwork == "" {
obj, _, err = readBody(cli.call("GET", "/services", nil, nil))
} else {
obj, _, err = readBody(cli.call("GET", "/services?network="+*flNetwork, nil, nil))
}
if err != nil {
return err
}
var serviceResources []serviceResource
err = json.Unmarshal(obj, &serviceResources)
if err != nil {
fmt.Println(err)
return err
}
wr := tabwriter.NewWriter(cli.out, 20, 1, 3, ' ', 0)
// unless quiet (-q) is specified, print field titles
if !*quiet {
fmt.Fprintln(wr, "SERVICE ID\tNAME\tNETWORK\tCONTAINER\tSANDBOX")
}
for _, sr := range serviceResources {
ID := sr.ID
bkID, sbID, err := getBackendID(cli, ID)
if err != nil {
return err
}
if !*noTrunc {
ID = stringid.TruncateID(ID)
bkID = stringid.TruncateID(bkID)
sbID = stringid.TruncateID(sbID)
}
if !*quiet {
fmt.Fprintf(wr, "%s\t%s\t%s\t%s\t%s\n", ID, sr.Name, sr.Network, bkID, sbID)
} else {
fmt.Fprintln(wr, ID)
}
}
wr.Flush()
return nil
}
|
[
"func",
"(",
"cli",
"*",
"NetworkCli",
")",
"CmdServiceLs",
"(",
"chain",
"string",
",",
"args",
"...",
"string",
")",
"error",
"{",
"cmd",
":=",
"cli",
".",
"Subcmd",
"(",
"chain",
",",
"\"ls\"",
",",
"\"SERVICE\"",
",",
"\"Lists all the services on a network\"",
",",
"false",
")",
"\n",
"flNetwork",
":=",
"cmd",
".",
"String",
"(",
"[",
"]",
"string",
"{",
"\"net\"",
",",
"\"-network\"",
"}",
",",
"\"\"",
",",
"\"Only show the services that are published on the specified network\"",
")",
"\n",
"quiet",
":=",
"cmd",
".",
"Bool",
"(",
"[",
"]",
"string",
"{",
"\"q\"",
",",
"\"-quiet\"",
"}",
",",
"false",
",",
"\"Only display numeric IDs\"",
")",
"\n",
"noTrunc",
":=",
"cmd",
".",
"Bool",
"(",
"[",
"]",
"string",
"{",
"\"#notrunc\"",
",",
"\"-no-trunc\"",
"}",
",",
"false",
",",
"\"Do not truncate the output\"",
")",
"\n",
"err",
":=",
"cmd",
".",
"ParseFlags",
"(",
"args",
",",
"true",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"var",
"obj",
"[",
"]",
"byte",
"\n",
"if",
"*",
"flNetwork",
"==",
"\"\"",
"{",
"obj",
",",
"_",
",",
"err",
"=",
"readBody",
"(",
"cli",
".",
"call",
"(",
"\"GET\"",
",",
"\"/services\"",
",",
"nil",
",",
"nil",
")",
")",
"\n",
"}",
"else",
"{",
"obj",
",",
"_",
",",
"err",
"=",
"readBody",
"(",
"cli",
".",
"call",
"(",
"\"GET\"",
",",
"\"/services?network=\"",
"+",
"*",
"flNetwork",
",",
"nil",
",",
"nil",
")",
")",
"\n",
"}",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"var",
"serviceResources",
"[",
"]",
"serviceResource",
"\n",
"err",
"=",
"json",
".",
"Unmarshal",
"(",
"obj",
",",
"&",
"serviceResources",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"fmt",
".",
"Println",
"(",
"err",
")",
"\n",
"return",
"err",
"\n",
"}",
"\n",
"wr",
":=",
"tabwriter",
".",
"NewWriter",
"(",
"cli",
".",
"out",
",",
"20",
",",
"1",
",",
"3",
",",
"' '",
",",
"0",
")",
"\n",
"if",
"!",
"*",
"quiet",
"{",
"fmt",
".",
"Fprintln",
"(",
"wr",
",",
"\"SERVICE ID\\tNAME\\tNETWORK\\tCONTAINER\\tSANDBOX\"",
")",
"\n",
"}",
"\n",
"\\t",
"\n",
"\\t",
"\n",
"\\t",
"\n",
"}"
] |
// CmdServiceLs handles service list UI
|
[
"CmdServiceLs",
"handles",
"service",
"list",
"UI"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/client/service.go#L215-L269
|
train
|
docker/libnetwork
|
client/service.go
|
CmdServiceInfo
|
func (cli *NetworkCli) CmdServiceInfo(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "info", "SERVICE[.NETWORK]", "Displays detailed information about a service", false)
cmd.Require(flag.Min, 1)
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
sn, nn := parseServiceName(cmd.Arg(0))
serviceID, err := lookupServiceID(cli, nn, sn)
if err != nil {
return err
}
obj, _, err := readBody(cli.call("GET", "/services/"+serviceID, nil, nil))
if err != nil {
return err
}
sr := &serviceResource{}
if err := json.NewDecoder(bytes.NewReader(obj)).Decode(sr); err != nil {
return err
}
fmt.Fprintf(cli.out, "Service Id: %s\n", sr.ID)
fmt.Fprintf(cli.out, "\tName: %s\n", sr.Name)
fmt.Fprintf(cli.out, "\tNetwork: %s\n", sr.Network)
return nil
}
|
go
|
func (cli *NetworkCli) CmdServiceInfo(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "info", "SERVICE[.NETWORK]", "Displays detailed information about a service", false)
cmd.Require(flag.Min, 1)
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
sn, nn := parseServiceName(cmd.Arg(0))
serviceID, err := lookupServiceID(cli, nn, sn)
if err != nil {
return err
}
obj, _, err := readBody(cli.call("GET", "/services/"+serviceID, nil, nil))
if err != nil {
return err
}
sr := &serviceResource{}
if err := json.NewDecoder(bytes.NewReader(obj)).Decode(sr); err != nil {
return err
}
fmt.Fprintf(cli.out, "Service Id: %s\n", sr.ID)
fmt.Fprintf(cli.out, "\tName: %s\n", sr.Name)
fmt.Fprintf(cli.out, "\tNetwork: %s\n", sr.Network)
return nil
}
|
[
"func",
"(",
"cli",
"*",
"NetworkCli",
")",
"CmdServiceInfo",
"(",
"chain",
"string",
",",
"args",
"...",
"string",
")",
"error",
"{",
"cmd",
":=",
"cli",
".",
"Subcmd",
"(",
"chain",
",",
"\"info\"",
",",
"\"SERVICE[.NETWORK]\"",
",",
"\"Displays detailed information about a service\"",
",",
"false",
")",
"\n",
"cmd",
".",
"Require",
"(",
"flag",
".",
"Min",
",",
"1",
")",
"\n",
"err",
":=",
"cmd",
".",
"ParseFlags",
"(",
"args",
",",
"true",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"sn",
",",
"nn",
":=",
"parseServiceName",
"(",
"cmd",
".",
"Arg",
"(",
"0",
")",
")",
"\n",
"serviceID",
",",
"err",
":=",
"lookupServiceID",
"(",
"cli",
",",
"nn",
",",
"sn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"obj",
",",
"_",
",",
"err",
":=",
"readBody",
"(",
"cli",
".",
"call",
"(",
"\"GET\"",
",",
"\"/services/\"",
"+",
"serviceID",
",",
"nil",
",",
"nil",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"sr",
":=",
"&",
"serviceResource",
"{",
"}",
"\n",
"if",
"err",
":=",
"json",
".",
"NewDecoder",
"(",
"bytes",
".",
"NewReader",
"(",
"obj",
")",
")",
".",
"Decode",
"(",
"sr",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"fmt",
".",
"Fprintf",
"(",
"cli",
".",
"out",
",",
"\"Service Id: %s\\n\"",
",",
"\\n",
")",
"\n",
"sr",
".",
"ID",
"\n",
"fmt",
".",
"Fprintf",
"(",
"cli",
".",
"out",
",",
"\"\\tName: %s\\n\"",
",",
"\\t",
")",
"\n",
"\\n",
"\n",
"}"
] |
// CmdServiceInfo handles service info UI
|
[
"CmdServiceInfo",
"handles",
"service",
"info",
"UI"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/client/service.go#L294-L324
|
train
|
docker/libnetwork
|
client/service.go
|
CmdServiceAttach
|
func (cli *NetworkCli) CmdServiceAttach(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "attach", "CONTAINER SERVICE[.NETWORK]", "Sets a container as a service backend", false)
flAlias := opts.NewListOpts(netutils.ValidateAlias)
cmd.Var(&flAlias, []string{"-alias"}, "Add alias for another container")
cmd.Require(flag.Min, 2)
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
containerID, err := lookupContainerID(cli, cmd.Arg(0))
if err != nil {
return err
}
sandboxID, err := lookupSandboxID(cli, containerID)
if err != nil {
return err
}
sn, nn := parseServiceName(cmd.Arg(1))
serviceID, err := lookupServiceID(cli, nn, sn)
if err != nil {
return err
}
nc := serviceAttach{SandboxID: sandboxID, Aliases: flAlias.GetAll()}
_, _, err = readBody(cli.call("POST", "/services/"+serviceID+"/backend", nc, nil))
return err
}
|
go
|
func (cli *NetworkCli) CmdServiceAttach(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "attach", "CONTAINER SERVICE[.NETWORK]", "Sets a container as a service backend", false)
flAlias := opts.NewListOpts(netutils.ValidateAlias)
cmd.Var(&flAlias, []string{"-alias"}, "Add alias for another container")
cmd.Require(flag.Min, 2)
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
containerID, err := lookupContainerID(cli, cmd.Arg(0))
if err != nil {
return err
}
sandboxID, err := lookupSandboxID(cli, containerID)
if err != nil {
return err
}
sn, nn := parseServiceName(cmd.Arg(1))
serviceID, err := lookupServiceID(cli, nn, sn)
if err != nil {
return err
}
nc := serviceAttach{SandboxID: sandboxID, Aliases: flAlias.GetAll()}
_, _, err = readBody(cli.call("POST", "/services/"+serviceID+"/backend", nc, nil))
return err
}
|
[
"func",
"(",
"cli",
"*",
"NetworkCli",
")",
"CmdServiceAttach",
"(",
"chain",
"string",
",",
"args",
"...",
"string",
")",
"error",
"{",
"cmd",
":=",
"cli",
".",
"Subcmd",
"(",
"chain",
",",
"\"attach\"",
",",
"\"CONTAINER SERVICE[.NETWORK]\"",
",",
"\"Sets a container as a service backend\"",
",",
"false",
")",
"\n",
"flAlias",
":=",
"opts",
".",
"NewListOpts",
"(",
"netutils",
".",
"ValidateAlias",
")",
"\n",
"cmd",
".",
"Var",
"(",
"&",
"flAlias",
",",
"[",
"]",
"string",
"{",
"\"-alias\"",
"}",
",",
"\"Add alias for another container\"",
")",
"\n",
"cmd",
".",
"Require",
"(",
"flag",
".",
"Min",
",",
"2",
")",
"\n",
"err",
":=",
"cmd",
".",
"ParseFlags",
"(",
"args",
",",
"true",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"containerID",
",",
"err",
":=",
"lookupContainerID",
"(",
"cli",
",",
"cmd",
".",
"Arg",
"(",
"0",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"sandboxID",
",",
"err",
":=",
"lookupSandboxID",
"(",
"cli",
",",
"containerID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"sn",
",",
"nn",
":=",
"parseServiceName",
"(",
"cmd",
".",
"Arg",
"(",
"1",
")",
")",
"\n",
"serviceID",
",",
"err",
":=",
"lookupServiceID",
"(",
"cli",
",",
"nn",
",",
"sn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"nc",
":=",
"serviceAttach",
"{",
"SandboxID",
":",
"sandboxID",
",",
"Aliases",
":",
"flAlias",
".",
"GetAll",
"(",
")",
"}",
"\n",
"_",
",",
"_",
",",
"err",
"=",
"readBody",
"(",
"cli",
".",
"call",
"(",
"\"POST\"",
",",
"\"/services/\"",
"+",
"serviceID",
"+",
"\"/backend\"",
",",
"nc",
",",
"nil",
")",
")",
"\n",
"return",
"err",
"\n",
"}"
] |
// CmdServiceAttach handles service attach UI
|
[
"CmdServiceAttach",
"handles",
"service",
"attach",
"UI"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/client/service.go#L327-L358
|
train
|
docker/libnetwork
|
client/service.go
|
CmdServiceDetach
|
func (cli *NetworkCli) CmdServiceDetach(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "detach", "CONTAINER SERVICE", "Removes a container from service backend", false)
cmd.Require(flag.Min, 2)
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
sn, nn := parseServiceName(cmd.Arg(1))
containerID, err := lookupContainerID(cli, cmd.Arg(0))
if err != nil {
return err
}
sandboxID, err := lookupSandboxID(cli, containerID)
if err != nil {
return err
}
serviceID, err := lookupServiceID(cli, nn, sn)
if err != nil {
return err
}
_, _, err = readBody(cli.call("DELETE", "/services/"+serviceID+"/backend/"+sandboxID, nil, nil))
if err != nil {
return err
}
return nil
}
|
go
|
func (cli *NetworkCli) CmdServiceDetach(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "detach", "CONTAINER SERVICE", "Removes a container from service backend", false)
cmd.Require(flag.Min, 2)
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
sn, nn := parseServiceName(cmd.Arg(1))
containerID, err := lookupContainerID(cli, cmd.Arg(0))
if err != nil {
return err
}
sandboxID, err := lookupSandboxID(cli, containerID)
if err != nil {
return err
}
serviceID, err := lookupServiceID(cli, nn, sn)
if err != nil {
return err
}
_, _, err = readBody(cli.call("DELETE", "/services/"+serviceID+"/backend/"+sandboxID, nil, nil))
if err != nil {
return err
}
return nil
}
|
[
"func",
"(",
"cli",
"*",
"NetworkCli",
")",
"CmdServiceDetach",
"(",
"chain",
"string",
",",
"args",
"...",
"string",
")",
"error",
"{",
"cmd",
":=",
"cli",
".",
"Subcmd",
"(",
"chain",
",",
"\"detach\"",
",",
"\"CONTAINER SERVICE\"",
",",
"\"Removes a container from service backend\"",
",",
"false",
")",
"\n",
"cmd",
".",
"Require",
"(",
"flag",
".",
"Min",
",",
"2",
")",
"\n",
"err",
":=",
"cmd",
".",
"ParseFlags",
"(",
"args",
",",
"true",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"sn",
",",
"nn",
":=",
"parseServiceName",
"(",
"cmd",
".",
"Arg",
"(",
"1",
")",
")",
"\n",
"containerID",
",",
"err",
":=",
"lookupContainerID",
"(",
"cli",
",",
"cmd",
".",
"Arg",
"(",
"0",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"sandboxID",
",",
"err",
":=",
"lookupSandboxID",
"(",
"cli",
",",
"containerID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"serviceID",
",",
"err",
":=",
"lookupServiceID",
"(",
"cli",
",",
"nn",
",",
"sn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"_",
",",
"_",
",",
"err",
"=",
"readBody",
"(",
"cli",
".",
"call",
"(",
"\"DELETE\"",
",",
"\"/services/\"",
"+",
"serviceID",
"+",
"\"/backend/\"",
"+",
"sandboxID",
",",
"nil",
",",
"nil",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] |
// CmdServiceDetach handles service detach UI
|
[
"CmdServiceDetach",
"handles",
"service",
"detach",
"UI"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/client/service.go#L361-L390
|
train
|
docker/libnetwork
|
ipam/store.go
|
SetValue
|
func (aSpace *addrSpace) SetValue(value []byte) error {
rc := &addrSpace{subnets: make(map[SubnetKey]*PoolData)}
if err := json.Unmarshal(value, rc); err != nil {
return err
}
aSpace.subnets = rc.subnets
return nil
}
|
go
|
func (aSpace *addrSpace) SetValue(value []byte) error {
rc := &addrSpace{subnets: make(map[SubnetKey]*PoolData)}
if err := json.Unmarshal(value, rc); err != nil {
return err
}
aSpace.subnets = rc.subnets
return nil
}
|
[
"func",
"(",
"aSpace",
"*",
"addrSpace",
")",
"SetValue",
"(",
"value",
"[",
"]",
"byte",
")",
"error",
"{",
"rc",
":=",
"&",
"addrSpace",
"{",
"subnets",
":",
"make",
"(",
"map",
"[",
"SubnetKey",
"]",
"*",
"PoolData",
")",
"}",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"value",
",",
"rc",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"aSpace",
".",
"subnets",
"=",
"rc",
".",
"subnets",
"\n",
"return",
"nil",
"\n",
"}"
] |
// SetValue unmarshalls the data from the KV store.
|
[
"SetValue",
"unmarshalls",
"the",
"data",
"from",
"the",
"KV",
"store",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipam/store.go#L36-L43
|
train
|
docker/libnetwork
|
ipvs/ipvs.go
|
New
|
func New(path string) (*Handle, error) {
setup()
n := netns.None()
if path != "" {
var err error
n, err = netns.GetFromPath(path)
if err != nil {
return nil, err
}
}
defer n.Close()
sock, err := nl.GetNetlinkSocketAt(n, netns.None(), syscall.NETLINK_GENERIC)
if err != nil {
return nil, err
}
// Add operation timeout to avoid deadlocks
tv := syscall.NsecToTimeval(netlinkSendSocketTimeout.Nanoseconds())
if err := sock.SetSendTimeout(&tv); err != nil {
return nil, err
}
tv = syscall.NsecToTimeval(netlinkRecvSocketsTimeout.Nanoseconds())
if err := sock.SetReceiveTimeout(&tv); err != nil {
return nil, err
}
return &Handle{sock: sock}, nil
}
|
go
|
func New(path string) (*Handle, error) {
setup()
n := netns.None()
if path != "" {
var err error
n, err = netns.GetFromPath(path)
if err != nil {
return nil, err
}
}
defer n.Close()
sock, err := nl.GetNetlinkSocketAt(n, netns.None(), syscall.NETLINK_GENERIC)
if err != nil {
return nil, err
}
// Add operation timeout to avoid deadlocks
tv := syscall.NsecToTimeval(netlinkSendSocketTimeout.Nanoseconds())
if err := sock.SetSendTimeout(&tv); err != nil {
return nil, err
}
tv = syscall.NsecToTimeval(netlinkRecvSocketsTimeout.Nanoseconds())
if err := sock.SetReceiveTimeout(&tv); err != nil {
return nil, err
}
return &Handle{sock: sock}, nil
}
|
[
"func",
"New",
"(",
"path",
"string",
")",
"(",
"*",
"Handle",
",",
"error",
")",
"{",
"setup",
"(",
")",
"\n",
"n",
":=",
"netns",
".",
"None",
"(",
")",
"\n",
"if",
"path",
"!=",
"\"\"",
"{",
"var",
"err",
"error",
"\n",
"n",
",",
"err",
"=",
"netns",
".",
"GetFromPath",
"(",
"path",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"defer",
"n",
".",
"Close",
"(",
")",
"\n",
"sock",
",",
"err",
":=",
"nl",
".",
"GetNetlinkSocketAt",
"(",
"n",
",",
"netns",
".",
"None",
"(",
")",
",",
"syscall",
".",
"NETLINK_GENERIC",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"tv",
":=",
"syscall",
".",
"NsecToTimeval",
"(",
"netlinkSendSocketTimeout",
".",
"Nanoseconds",
"(",
")",
")",
"\n",
"if",
"err",
":=",
"sock",
".",
"SetSendTimeout",
"(",
"&",
"tv",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"tv",
"=",
"syscall",
".",
"NsecToTimeval",
"(",
"netlinkRecvSocketsTimeout",
".",
"Nanoseconds",
"(",
")",
")",
"\n",
"if",
"err",
":=",
"sock",
".",
"SetReceiveTimeout",
"(",
"&",
"tv",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"&",
"Handle",
"{",
"sock",
":",
"sock",
"}",
",",
"nil",
"\n",
"}"
] |
// New provides a new ipvs handle in the namespace pointed to by the
// passed path. It will return a valid handle or an error in case an
// error occurred while creating the handle.
|
[
"New",
"provides",
"a",
"new",
"ipvs",
"handle",
"in",
"the",
"namespace",
"pointed",
"to",
"by",
"the",
"passed",
"path",
".",
"It",
"will",
"return",
"a",
"valid",
"handle",
"or",
"an",
"error",
"in",
"case",
"an",
"error",
"occurred",
"while",
"creating",
"the",
"handle",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/ipvs.go#L88-L116
|
train
|
docker/libnetwork
|
ipvs/ipvs.go
|
NewService
|
func (i *Handle) NewService(s *Service) error {
return i.doCmd(s, nil, ipvsCmdNewService)
}
|
go
|
func (i *Handle) NewService(s *Service) error {
return i.doCmd(s, nil, ipvsCmdNewService)
}
|
[
"func",
"(",
"i",
"*",
"Handle",
")",
"NewService",
"(",
"s",
"*",
"Service",
")",
"error",
"{",
"return",
"i",
".",
"doCmd",
"(",
"s",
",",
"nil",
",",
"ipvsCmdNewService",
")",
"\n",
"}"
] |
// NewService creates a new ipvs service in the passed handle.
|
[
"NewService",
"creates",
"a",
"new",
"ipvs",
"service",
"in",
"the",
"passed",
"handle",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/ipvs.go#L127-L129
|
train
|
docker/libnetwork
|
ipvs/ipvs.go
|
IsServicePresent
|
func (i *Handle) IsServicePresent(s *Service) bool {
return nil == i.doCmd(s, nil, ipvsCmdGetService)
}
|
go
|
func (i *Handle) IsServicePresent(s *Service) bool {
return nil == i.doCmd(s, nil, ipvsCmdGetService)
}
|
[
"func",
"(",
"i",
"*",
"Handle",
")",
"IsServicePresent",
"(",
"s",
"*",
"Service",
")",
"bool",
"{",
"return",
"nil",
"==",
"i",
".",
"doCmd",
"(",
"s",
",",
"nil",
",",
"ipvsCmdGetService",
")",
"\n",
"}"
] |
// IsServicePresent queries for the ipvs service in the passed handle.
|
[
"IsServicePresent",
"queries",
"for",
"the",
"ipvs",
"service",
"in",
"the",
"passed",
"handle",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/ipvs.go#L132-L134
|
train
|
docker/libnetwork
|
ipvs/ipvs.go
|
UpdateService
|
func (i *Handle) UpdateService(s *Service) error {
return i.doCmd(s, nil, ipvsCmdSetService)
}
|
go
|
func (i *Handle) UpdateService(s *Service) error {
return i.doCmd(s, nil, ipvsCmdSetService)
}
|
[
"func",
"(",
"i",
"*",
"Handle",
")",
"UpdateService",
"(",
"s",
"*",
"Service",
")",
"error",
"{",
"return",
"i",
".",
"doCmd",
"(",
"s",
",",
"nil",
",",
"ipvsCmdSetService",
")",
"\n",
"}"
] |
// UpdateService updates an already existing service in the passed
// handle.
|
[
"UpdateService",
"updates",
"an",
"already",
"existing",
"service",
"in",
"the",
"passed",
"handle",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/ipvs.go#L138-L140
|
train
|
docker/libnetwork
|
ipvs/ipvs.go
|
DelService
|
func (i *Handle) DelService(s *Service) error {
return i.doCmd(s, nil, ipvsCmdDelService)
}
|
go
|
func (i *Handle) DelService(s *Service) error {
return i.doCmd(s, nil, ipvsCmdDelService)
}
|
[
"func",
"(",
"i",
"*",
"Handle",
")",
"DelService",
"(",
"s",
"*",
"Service",
")",
"error",
"{",
"return",
"i",
".",
"doCmd",
"(",
"s",
",",
"nil",
",",
"ipvsCmdDelService",
")",
"\n",
"}"
] |
// DelService deletes an already existing service in the passed
// handle.
|
[
"DelService",
"deletes",
"an",
"already",
"existing",
"service",
"in",
"the",
"passed",
"handle",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/ipvs.go#L144-L146
|
train
|
docker/libnetwork
|
ipvs/ipvs.go
|
Flush
|
func (i *Handle) Flush() error {
_, err := i.doCmdWithoutAttr(ipvsCmdFlush)
return err
}
|
go
|
func (i *Handle) Flush() error {
_, err := i.doCmdWithoutAttr(ipvsCmdFlush)
return err
}
|
[
"func",
"(",
"i",
"*",
"Handle",
")",
"Flush",
"(",
")",
"error",
"{",
"_",
",",
"err",
":=",
"i",
".",
"doCmdWithoutAttr",
"(",
"ipvsCmdFlush",
")",
"\n",
"return",
"err",
"\n",
"}"
] |
// Flush deletes all existing services in the passed
// handle.
|
[
"Flush",
"deletes",
"all",
"existing",
"services",
"in",
"the",
"passed",
"handle",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/ipvs.go#L150-L153
|
train
|
docker/libnetwork
|
ipvs/ipvs.go
|
NewDestination
|
func (i *Handle) NewDestination(s *Service, d *Destination) error {
return i.doCmd(s, d, ipvsCmdNewDest)
}
|
go
|
func (i *Handle) NewDestination(s *Service, d *Destination) error {
return i.doCmd(s, d, ipvsCmdNewDest)
}
|
[
"func",
"(",
"i",
"*",
"Handle",
")",
"NewDestination",
"(",
"s",
"*",
"Service",
",",
"d",
"*",
"Destination",
")",
"error",
"{",
"return",
"i",
".",
"doCmd",
"(",
"s",
",",
"d",
",",
"ipvsCmdNewDest",
")",
"\n",
"}"
] |
// NewDestination creates a new real server in the passed ipvs
// service which should already be existing in the passed handle.
|
[
"NewDestination",
"creates",
"a",
"new",
"real",
"server",
"in",
"the",
"passed",
"ipvs",
"service",
"which",
"should",
"already",
"be",
"existing",
"in",
"the",
"passed",
"handle",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/ipvs.go#L157-L159
|
train
|
docker/libnetwork
|
ipvs/ipvs.go
|
UpdateDestination
|
func (i *Handle) UpdateDestination(s *Service, d *Destination) error {
return i.doCmd(s, d, ipvsCmdSetDest)
}
|
go
|
func (i *Handle) UpdateDestination(s *Service, d *Destination) error {
return i.doCmd(s, d, ipvsCmdSetDest)
}
|
[
"func",
"(",
"i",
"*",
"Handle",
")",
"UpdateDestination",
"(",
"s",
"*",
"Service",
",",
"d",
"*",
"Destination",
")",
"error",
"{",
"return",
"i",
".",
"doCmd",
"(",
"s",
",",
"d",
",",
"ipvsCmdSetDest",
")",
"\n",
"}"
] |
// UpdateDestination updates an already existing real server in the
// passed ipvs service in the passed handle.
|
[
"UpdateDestination",
"updates",
"an",
"already",
"existing",
"real",
"server",
"in",
"the",
"passed",
"ipvs",
"service",
"in",
"the",
"passed",
"handle",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/ipvs.go#L163-L165
|
train
|
docker/libnetwork
|
ipvs/ipvs.go
|
DelDestination
|
func (i *Handle) DelDestination(s *Service, d *Destination) error {
return i.doCmd(s, d, ipvsCmdDelDest)
}
|
go
|
func (i *Handle) DelDestination(s *Service, d *Destination) error {
return i.doCmd(s, d, ipvsCmdDelDest)
}
|
[
"func",
"(",
"i",
"*",
"Handle",
")",
"DelDestination",
"(",
"s",
"*",
"Service",
",",
"d",
"*",
"Destination",
")",
"error",
"{",
"return",
"i",
".",
"doCmd",
"(",
"s",
",",
"d",
",",
"ipvsCmdDelDest",
")",
"\n",
"}"
] |
// DelDestination deletes an already existing real server in the
// passed ipvs service in the passed handle.
|
[
"DelDestination",
"deletes",
"an",
"already",
"existing",
"real",
"server",
"in",
"the",
"passed",
"ipvs",
"service",
"in",
"the",
"passed",
"handle",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/ipvs.go#L169-L171
|
train
|
docker/libnetwork
|
ipvs/ipvs.go
|
GetDestinations
|
func (i *Handle) GetDestinations(s *Service) ([]*Destination, error) {
return i.doGetDestinationsCmd(s, nil)
}
|
go
|
func (i *Handle) GetDestinations(s *Service) ([]*Destination, error) {
return i.doGetDestinationsCmd(s, nil)
}
|
[
"func",
"(",
"i",
"*",
"Handle",
")",
"GetDestinations",
"(",
"s",
"*",
"Service",
")",
"(",
"[",
"]",
"*",
"Destination",
",",
"error",
")",
"{",
"return",
"i",
".",
"doGetDestinationsCmd",
"(",
"s",
",",
"nil",
")",
"\n",
"}"
] |
// GetDestinations returns an array of Destinations configured for this Service
|
[
"GetDestinations",
"returns",
"an",
"array",
"of",
"Destinations",
"configured",
"for",
"this",
"Service"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/ipvs.go#L179-L181
|
train
|
docker/libnetwork
|
ipvs/ipvs.go
|
GetService
|
func (i *Handle) GetService(s *Service) (*Service, error) {
res, err := i.doGetServicesCmd(s)
if err != nil {
return nil, err
}
// We are looking for exactly one service otherwise error out
if len(res) != 1 {
return nil, fmt.Errorf("Expected only one service obtained=%d", len(res))
}
return res[0], nil
}
|
go
|
func (i *Handle) GetService(s *Service) (*Service, error) {
res, err := i.doGetServicesCmd(s)
if err != nil {
return nil, err
}
// We are looking for exactly one service otherwise error out
if len(res) != 1 {
return nil, fmt.Errorf("Expected only one service obtained=%d", len(res))
}
return res[0], nil
}
|
[
"func",
"(",
"i",
"*",
"Handle",
")",
"GetService",
"(",
"s",
"*",
"Service",
")",
"(",
"*",
"Service",
",",
"error",
")",
"{",
"res",
",",
"err",
":=",
"i",
".",
"doGetServicesCmd",
"(",
"s",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"len",
"(",
"res",
")",
"!=",
"1",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"Expected only one service obtained=%d\"",
",",
"len",
"(",
"res",
")",
")",
"\n",
"}",
"\n",
"return",
"res",
"[",
"0",
"]",
",",
"nil",
"\n",
"}"
] |
// GetService gets details of a specific IPVS services, useful in updating statisics etc.,
|
[
"GetService",
"gets",
"details",
"of",
"a",
"specific",
"IPVS",
"services",
"useful",
"in",
"updating",
"statisics",
"etc",
"."
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/ipvs.go#L184-L197
|
train
|
docker/libnetwork
|
portmapper/mapper.go
|
NewWithPortAllocator
|
func NewWithPortAllocator(allocator *portallocator.PortAllocator, proxyPath string) *PortMapper {
return &PortMapper{
currentMappings: make(map[string]*mapping),
Allocator: allocator,
proxyPath: proxyPath,
}
}
|
go
|
func NewWithPortAllocator(allocator *portallocator.PortAllocator, proxyPath string) *PortMapper {
return &PortMapper{
currentMappings: make(map[string]*mapping),
Allocator: allocator,
proxyPath: proxyPath,
}
}
|
[
"func",
"NewWithPortAllocator",
"(",
"allocator",
"*",
"portallocator",
".",
"PortAllocator",
",",
"proxyPath",
"string",
")",
"*",
"PortMapper",
"{",
"return",
"&",
"PortMapper",
"{",
"currentMappings",
":",
"make",
"(",
"map",
"[",
"string",
"]",
"*",
"mapping",
")",
",",
"Allocator",
":",
"allocator",
",",
"proxyPath",
":",
"proxyPath",
",",
"}",
"\n",
"}"
] |
// NewWithPortAllocator returns a new instance of PortMapper which will use the specified PortAllocator
|
[
"NewWithPortAllocator",
"returns",
"a",
"new",
"instance",
"of",
"PortMapper",
"which",
"will",
"use",
"the",
"specified",
"PortAllocator"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/portmapper/mapper.go#L39-L45
|
train
|
docker/libnetwork
|
portmapper/mapper.go
|
Map
|
func (pm *PortMapper) Map(container net.Addr, hostIP net.IP, hostPort int, useProxy bool) (host net.Addr, err error) {
return pm.MapRange(container, hostIP, hostPort, hostPort, useProxy)
}
|
go
|
func (pm *PortMapper) Map(container net.Addr, hostIP net.IP, hostPort int, useProxy bool) (host net.Addr, err error) {
return pm.MapRange(container, hostIP, hostPort, hostPort, useProxy)
}
|
[
"func",
"(",
"pm",
"*",
"PortMapper",
")",
"Map",
"(",
"container",
"net",
".",
"Addr",
",",
"hostIP",
"net",
".",
"IP",
",",
"hostPort",
"int",
",",
"useProxy",
"bool",
")",
"(",
"host",
"net",
".",
"Addr",
",",
"err",
"error",
")",
"{",
"return",
"pm",
".",
"MapRange",
"(",
"container",
",",
"hostIP",
",",
"hostPort",
",",
"hostPort",
",",
"useProxy",
")",
"\n",
"}"
] |
// Map maps the specified container transport address to the host's network address and transport port
|
[
"Map",
"maps",
"the",
"specified",
"container",
"transport",
"address",
"to",
"the",
"host",
"s",
"network",
"address",
"and",
"transport",
"port"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/portmapper/mapper.go#L48-L50
|
train
|
docker/libnetwork
|
portmapper/mapper.go
|
Unmap
|
func (pm *PortMapper) Unmap(host net.Addr) error {
pm.lock.Lock()
defer pm.lock.Unlock()
key := getKey(host)
data, exists := pm.currentMappings[key]
if !exists {
return ErrPortNotMapped
}
if data.userlandProxy != nil {
data.userlandProxy.Stop()
}
delete(pm.currentMappings, key)
containerIP, containerPort := getIPAndPort(data.container)
hostIP, hostPort := getIPAndPort(data.host)
if err := pm.DeleteForwardingTableEntry(data.proto, hostIP, hostPort, containerIP.String(), containerPort); err != nil {
logrus.Errorf("Error on iptables delete: %s", err)
}
switch a := host.(type) {
case *net.TCPAddr:
return pm.Allocator.ReleasePort(a.IP, "tcp", a.Port)
case *net.UDPAddr:
return pm.Allocator.ReleasePort(a.IP, "udp", a.Port)
case *sctp.SCTPAddr:
if len(a.IP) == 0 {
return ErrSCTPAddrNoIP
}
return pm.Allocator.ReleasePort(a.IP[0], "sctp", a.Port)
}
return ErrUnknownBackendAddressType
}
|
go
|
func (pm *PortMapper) Unmap(host net.Addr) error {
pm.lock.Lock()
defer pm.lock.Unlock()
key := getKey(host)
data, exists := pm.currentMappings[key]
if !exists {
return ErrPortNotMapped
}
if data.userlandProxy != nil {
data.userlandProxy.Stop()
}
delete(pm.currentMappings, key)
containerIP, containerPort := getIPAndPort(data.container)
hostIP, hostPort := getIPAndPort(data.host)
if err := pm.DeleteForwardingTableEntry(data.proto, hostIP, hostPort, containerIP.String(), containerPort); err != nil {
logrus.Errorf("Error on iptables delete: %s", err)
}
switch a := host.(type) {
case *net.TCPAddr:
return pm.Allocator.ReleasePort(a.IP, "tcp", a.Port)
case *net.UDPAddr:
return pm.Allocator.ReleasePort(a.IP, "udp", a.Port)
case *sctp.SCTPAddr:
if len(a.IP) == 0 {
return ErrSCTPAddrNoIP
}
return pm.Allocator.ReleasePort(a.IP[0], "sctp", a.Port)
}
return ErrUnknownBackendAddressType
}
|
[
"func",
"(",
"pm",
"*",
"PortMapper",
")",
"Unmap",
"(",
"host",
"net",
".",
"Addr",
")",
"error",
"{",
"pm",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"pm",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n",
"key",
":=",
"getKey",
"(",
"host",
")",
"\n",
"data",
",",
"exists",
":=",
"pm",
".",
"currentMappings",
"[",
"key",
"]",
"\n",
"if",
"!",
"exists",
"{",
"return",
"ErrPortNotMapped",
"\n",
"}",
"\n",
"if",
"data",
".",
"userlandProxy",
"!=",
"nil",
"{",
"data",
".",
"userlandProxy",
".",
"Stop",
"(",
")",
"\n",
"}",
"\n",
"delete",
"(",
"pm",
".",
"currentMappings",
",",
"key",
")",
"\n",
"containerIP",
",",
"containerPort",
":=",
"getIPAndPort",
"(",
"data",
".",
"container",
")",
"\n",
"hostIP",
",",
"hostPort",
":=",
"getIPAndPort",
"(",
"data",
".",
"host",
")",
"\n",
"if",
"err",
":=",
"pm",
".",
"DeleteForwardingTableEntry",
"(",
"data",
".",
"proto",
",",
"hostIP",
",",
"hostPort",
",",
"containerIP",
".",
"String",
"(",
")",
",",
"containerPort",
")",
";",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Errorf",
"(",
"\"Error on iptables delete: %s\"",
",",
"err",
")",
"\n",
"}",
"\n",
"switch",
"a",
":=",
"host",
".",
"(",
"type",
")",
"{",
"case",
"*",
"net",
".",
"TCPAddr",
":",
"return",
"pm",
".",
"Allocator",
".",
"ReleasePort",
"(",
"a",
".",
"IP",
",",
"\"tcp\"",
",",
"a",
".",
"Port",
")",
"\n",
"case",
"*",
"net",
".",
"UDPAddr",
":",
"return",
"pm",
".",
"Allocator",
".",
"ReleasePort",
"(",
"a",
".",
"IP",
",",
"\"udp\"",
",",
"a",
".",
"Port",
")",
"\n",
"case",
"*",
"sctp",
".",
"SCTPAddr",
":",
"if",
"len",
"(",
"a",
".",
"IP",
")",
"==",
"0",
"{",
"return",
"ErrSCTPAddrNoIP",
"\n",
"}",
"\n",
"return",
"pm",
".",
"Allocator",
".",
"ReleasePort",
"(",
"a",
".",
"IP",
"[",
"0",
"]",
",",
"\"sctp\"",
",",
"a",
".",
"Port",
")",
"\n",
"}",
"\n",
"return",
"ErrUnknownBackendAddressType",
"\n",
"}"
] |
// Unmap removes stored mapping for the specified host transport address
|
[
"Unmap",
"removes",
"stored",
"mapping",
"for",
"the",
"specified",
"host",
"transport",
"address"
] |
9ff9b57c344df5cd47443ad9e65702ec85c5aeb0
|
https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/portmapper/mapper.go#L185-L219
|
train
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.