id
int32 0
167k
| repo
stringlengths 5
54
| path
stringlengths 4
155
| func_name
stringlengths 1
118
| original_string
stringlengths 52
85.5k
| language
stringclasses 1
value | code
stringlengths 52
85.5k
| code_tokens
sequencelengths 21
1.41k
| docstring
stringlengths 6
2.61k
| docstring_tokens
sequencelengths 3
215
| sha
stringlengths 40
40
| url
stringlengths 85
252
|
---|---|---|---|---|---|---|---|---|---|---|---|
162,300 | cilium/cilium | pkg/pprof/pprof.go | Enable | func Enable() {
go func() {
if err := http.ListenAndServe(apiAddress, nil); err != nil {
log.WithError(err).Warn("Unable to serve pprof API")
}
}()
} | go | func Enable() {
go func() {
if err := http.ListenAndServe(apiAddress, nil); err != nil {
log.WithError(err).Warn("Unable to serve pprof API")
}
}()
} | [
"func",
"Enable",
"(",
")",
"{",
"go",
"func",
"(",
")",
"{",
"if",
"err",
":=",
"http",
".",
"ListenAndServe",
"(",
"apiAddress",
",",
"nil",
")",
";",
"err",
"!=",
"nil",
"{",
"log",
".",
"WithError",
"(",
"err",
")",
".",
"Warn",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n",
"}"
] | // Enable runs an HTTP server to serve the pprof API | [
"Enable",
"runs",
"an",
"HTTP",
"server",
"to",
"serve",
"the",
"pprof",
"API"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/pprof/pprof.go#L31-L37 |
162,301 | cilium/cilium | proxylib/memcached/binary/parser.go | Create | func (p *ParserFactory) Create(connection *proxylib.Connection) proxylib.Parser {
log.Infof("ParserFactory: Create: %v", connection)
return &Parser{connection: connection, injectQueue: make([]queuedInject, 0)}
} | go | func (p *ParserFactory) Create(connection *proxylib.Connection) proxylib.Parser {
log.Infof("ParserFactory: Create: %v", connection)
return &Parser{connection: connection, injectQueue: make([]queuedInject, 0)}
} | [
"func",
"(",
"p",
"*",
"ParserFactory",
")",
"Create",
"(",
"connection",
"*",
"proxylib",
".",
"Connection",
")",
"proxylib",
".",
"Parser",
"{",
"log",
".",
"Infof",
"(",
"\"",
"\"",
",",
"connection",
")",
"\n",
"return",
"&",
"Parser",
"{",
"connection",
":",
"connection",
",",
"injectQueue",
":",
"make",
"(",
"[",
"]",
"queuedInject",
",",
"0",
")",
"}",
"\n",
"}"
] | // Create creates binary memcached parser | [
"Create",
"creates",
"binary",
"memcached",
"parser"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/proxylib/memcached/binary/parser.go#L33-L36 |
162,302 | cilium/cilium | api/v1/health/models/health_response.go | Validate | func (m *HealthResponse) Validate(formats strfmt.Registry) error {
var res []error
if err := m.validateCilium(formats); err != nil {
res = append(res, err)
}
if err := m.validateSystemLoad(formats); err != nil {
res = append(res, err)
}
if len(res) > 0 {
return errors.CompositeValidationError(res...)
}
return nil
} | go | func (m *HealthResponse) Validate(formats strfmt.Registry) error {
var res []error
if err := m.validateCilium(formats); err != nil {
res = append(res, err)
}
if err := m.validateSystemLoad(formats); err != nil {
res = append(res, err)
}
if len(res) > 0 {
return errors.CompositeValidationError(res...)
}
return nil
} | [
"func",
"(",
"m",
"*",
"HealthResponse",
")",
"Validate",
"(",
"formats",
"strfmt",
".",
"Registry",
")",
"error",
"{",
"var",
"res",
"[",
"]",
"error",
"\n\n",
"if",
"err",
":=",
"m",
".",
"validateCilium",
"(",
"formats",
")",
";",
"err",
"!=",
"nil",
"{",
"res",
"=",
"append",
"(",
"res",
",",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"m",
".",
"validateSystemLoad",
"(",
"formats",
")",
";",
"err",
"!=",
"nil",
"{",
"res",
"=",
"append",
"(",
"res",
",",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"res",
")",
">",
"0",
"{",
"return",
"errors",
".",
"CompositeValidationError",
"(",
"res",
"...",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // Validate validates this health response | [
"Validate",
"validates",
"this",
"health",
"response"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/health/models/health_response.go#L34-L49 |
162,303 | cilium/cilium | pkg/workloads/docker.go | networksMock | func networksMock() func(req *http.Request) (*http.Response, error) {
return func(req *http.Request) (*http.Response, error) {
if !strings.HasPrefix(req.URL.Path, "/v1.21/networks") {
return nil, fmt.Errorf("Only expecting /v1.21/networks requests, got %s", req.URL.Path)
}
header := http.Header{}
header.Set("Content-Type", "application/json")
body, err := json.Marshal(&dTypes.NetworkResource{
Name: "12345",
ID: "1234",
Scope: "global",
Driver: "cilium-net",
EnableIPv6: true,
IPAM: dNetwork.IPAM{},
Internal: false,
// this map contains all endpoints except 259
Containers: map[string]dTypes.EndpointResource{
"603e047d2268a57f5a5f93f7f9e1263e9207e348a06654bf64948def00100256": {
EndpointID: "93529fda8c401a071d21d6bd46fdf5499b9014dcb5a35f2e3efaa8d800200256",
},
"603e047d2268a57f5a5f93f7f9e1263e9207e348a06654bf64948def00100257": {
EndpointID: "93529fda8c401a071d21d6bd46fdf5499b9014dcb5a35f2e3efaa8d800200257",
},
"603e047d2268a57f5a5f93f7f9e1263e9207e348a06654bf64948def00100258": {
EndpointID: "93529fda8c401a071d21d6bd46fdf5499b9014dcb5a35f2e3efaa8d800100258",
},
},
Options: map[string]string{},
Labels: map[string]string{},
})
if err != nil {
return nil, err
}
return &http.Response{
StatusCode: 200,
Body: ioutil.NopCloser(bytes.NewReader(body)),
Header: header,
}, nil
}
} | go | func networksMock() func(req *http.Request) (*http.Response, error) {
return func(req *http.Request) (*http.Response, error) {
if !strings.HasPrefix(req.URL.Path, "/v1.21/networks") {
return nil, fmt.Errorf("Only expecting /v1.21/networks requests, got %s", req.URL.Path)
}
header := http.Header{}
header.Set("Content-Type", "application/json")
body, err := json.Marshal(&dTypes.NetworkResource{
Name: "12345",
ID: "1234",
Scope: "global",
Driver: "cilium-net",
EnableIPv6: true,
IPAM: dNetwork.IPAM{},
Internal: false,
// this map contains all endpoints except 259
Containers: map[string]dTypes.EndpointResource{
"603e047d2268a57f5a5f93f7f9e1263e9207e348a06654bf64948def00100256": {
EndpointID: "93529fda8c401a071d21d6bd46fdf5499b9014dcb5a35f2e3efaa8d800200256",
},
"603e047d2268a57f5a5f93f7f9e1263e9207e348a06654bf64948def00100257": {
EndpointID: "93529fda8c401a071d21d6bd46fdf5499b9014dcb5a35f2e3efaa8d800200257",
},
"603e047d2268a57f5a5f93f7f9e1263e9207e348a06654bf64948def00100258": {
EndpointID: "93529fda8c401a071d21d6bd46fdf5499b9014dcb5a35f2e3efaa8d800100258",
},
},
Options: map[string]string{},
Labels: map[string]string{},
})
if err != nil {
return nil, err
}
return &http.Response{
StatusCode: 200,
Body: ioutil.NopCloser(bytes.NewReader(body)),
Header: header,
}, nil
}
} | [
"func",
"networksMock",
"(",
")",
"func",
"(",
"req",
"*",
"http",
".",
"Request",
")",
"(",
"*",
"http",
".",
"Response",
",",
"error",
")",
"{",
"return",
"func",
"(",
"req",
"*",
"http",
".",
"Request",
")",
"(",
"*",
"http",
".",
"Response",
",",
"error",
")",
"{",
"if",
"!",
"strings",
".",
"HasPrefix",
"(",
"req",
".",
"URL",
".",
"Path",
",",
"\"",
"\"",
")",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"req",
".",
"URL",
".",
"Path",
")",
"\n",
"}",
"\n\n",
"header",
":=",
"http",
".",
"Header",
"{",
"}",
"\n",
"header",
".",
"Set",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n\n",
"body",
",",
"err",
":=",
"json",
".",
"Marshal",
"(",
"&",
"dTypes",
".",
"NetworkResource",
"{",
"Name",
":",
"\"",
"\"",
",",
"ID",
":",
"\"",
"\"",
",",
"Scope",
":",
"\"",
"\"",
",",
"Driver",
":",
"\"",
"\"",
",",
"EnableIPv6",
":",
"true",
",",
"IPAM",
":",
"dNetwork",
".",
"IPAM",
"{",
"}",
",",
"Internal",
":",
"false",
",",
"// this map contains all endpoints except 259",
"Containers",
":",
"map",
"[",
"string",
"]",
"dTypes",
".",
"EndpointResource",
"{",
"\"",
"\"",
":",
"{",
"EndpointID",
":",
"\"",
"\"",
",",
"}",
",",
"\"",
"\"",
":",
"{",
"EndpointID",
":",
"\"",
"\"",
",",
"}",
",",
"\"",
"\"",
":",
"{",
"EndpointID",
":",
"\"",
"\"",
",",
"}",
",",
"}",
",",
"Options",
":",
"map",
"[",
"string",
"]",
"string",
"{",
"}",
",",
"Labels",
":",
"map",
"[",
"string",
"]",
"string",
"{",
"}",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"&",
"http",
".",
"Response",
"{",
"StatusCode",
":",
"200",
",",
"Body",
":",
"ioutil",
".",
"NopCloser",
"(",
"bytes",
".",
"NewReader",
"(",
"body",
")",
")",
",",
"Header",
":",
"header",
",",
"}",
",",
"nil",
"\n",
"}",
"\n",
"}"
] | // Helper function to mock docker calls to networks endpoint | [
"Helper",
"function",
"to",
"mock",
"docker",
"calls",
"to",
"networks",
"endpoint"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/workloads/docker.go#L159-L201 |
162,304 | cilium/cilium | pkg/workloads/docker.go | GetAllInfraContainersPID | func (d *dockerClient) GetAllInfraContainersPID() (map[string]int, error) {
timeoutCtx, cancel := ctx.WithTimeout(ctx.Background(), 10*time.Second)
defer cancel()
cList, err := Client().workloadIDsList(timeoutCtx)
if err != nil {
log.WithError(err).Error("Failed to retrieve the container list")
return nil, err
}
pids := map[string]int{}
for _, contID := range cList {
cJSON, err := d.ContainerInspect(context.Background(), contID)
if err != nil {
continue
}
if cJSON.Config == nil || !utils.IsInfraContainer(cJSON.Config.Labels) {
continue
}
if cJSON.State == nil || !cJSON.State.Running {
continue
}
pids[cJSON.ID] = cJSON.State.Pid
}
return pids, nil
} | go | func (d *dockerClient) GetAllInfraContainersPID() (map[string]int, error) {
timeoutCtx, cancel := ctx.WithTimeout(ctx.Background(), 10*time.Second)
defer cancel()
cList, err := Client().workloadIDsList(timeoutCtx)
if err != nil {
log.WithError(err).Error("Failed to retrieve the container list")
return nil, err
}
pids := map[string]int{}
for _, contID := range cList {
cJSON, err := d.ContainerInspect(context.Background(), contID)
if err != nil {
continue
}
if cJSON.Config == nil || !utils.IsInfraContainer(cJSON.Config.Labels) {
continue
}
if cJSON.State == nil || !cJSON.State.Running {
continue
}
pids[cJSON.ID] = cJSON.State.Pid
}
return pids, nil
} | [
"func",
"(",
"d",
"*",
"dockerClient",
")",
"GetAllInfraContainersPID",
"(",
")",
"(",
"map",
"[",
"string",
"]",
"int",
",",
"error",
")",
"{",
"timeoutCtx",
",",
"cancel",
":=",
"ctx",
".",
"WithTimeout",
"(",
"ctx",
".",
"Background",
"(",
")",
",",
"10",
"*",
"time",
".",
"Second",
")",
"\n",
"defer",
"cancel",
"(",
")",
"\n\n",
"cList",
",",
"err",
":=",
"Client",
"(",
")",
".",
"workloadIDsList",
"(",
"timeoutCtx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"WithError",
"(",
"err",
")",
".",
"Error",
"(",
"\"",
"\"",
")",
"\n",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"pids",
":=",
"map",
"[",
"string",
"]",
"int",
"{",
"}",
"\n",
"for",
"_",
",",
"contID",
":=",
"range",
"cList",
"{",
"cJSON",
",",
"err",
":=",
"d",
".",
"ContainerInspect",
"(",
"context",
".",
"Background",
"(",
")",
",",
"contID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"continue",
"\n",
"}",
"\n",
"if",
"cJSON",
".",
"Config",
"==",
"nil",
"||",
"!",
"utils",
".",
"IsInfraContainer",
"(",
"cJSON",
".",
"Config",
".",
"Labels",
")",
"{",
"continue",
"\n",
"}",
"\n",
"if",
"cJSON",
".",
"State",
"==",
"nil",
"||",
"!",
"cJSON",
".",
"State",
".",
"Running",
"{",
"continue",
"\n",
"}",
"\n",
"pids",
"[",
"cJSON",
".",
"ID",
"]",
"=",
"cJSON",
".",
"State",
".",
"Pid",
"\n",
"}",
"\n\n",
"return",
"pids",
",",
"nil",
"\n",
"}"
] | // GetAllInfraContainersPID returns a map that maps container IDs to the PID
// of that container. | [
"GetAllInfraContainersPID",
"returns",
"a",
"map",
"that",
"maps",
"container",
"IDs",
"to",
"the",
"PID",
"of",
"that",
"container",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/workloads/docker.go#L544-L569 |
162,305 | cilium/cilium | pkg/bpf/map.go | mapTypeToFeatureString | func mapTypeToFeatureString(mt MapType) string {
var featureString string
switch mt {
case MapTypeLPMTrie:
featureString = fmt.Sprintf("#define HAVE_LPM_MAP_TYPE")
case MapTypeLRUHash:
featureString = fmt.Sprintf("#define HAVE_LRU_MAP_TYPE")
default:
break
}
return featureString
} | go | func mapTypeToFeatureString(mt MapType) string {
var featureString string
switch mt {
case MapTypeLPMTrie:
featureString = fmt.Sprintf("#define HAVE_LPM_MAP_TYPE")
case MapTypeLRUHash:
featureString = fmt.Sprintf("#define HAVE_LRU_MAP_TYPE")
default:
break
}
return featureString
} | [
"func",
"mapTypeToFeatureString",
"(",
"mt",
"MapType",
")",
"string",
"{",
"var",
"featureString",
"string",
"\n",
"switch",
"mt",
"{",
"case",
"MapTypeLPMTrie",
":",
"featureString",
"=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
")",
"\n",
"case",
"MapTypeLRUHash",
":",
"featureString",
"=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
")",
"\n",
"default",
":",
"break",
"\n",
"}",
"\n",
"return",
"featureString",
"\n",
"}"
] | // mapTypeToFeatureString maps a MapType into a string defined by run_probes.sh | [
"mapTypeToFeatureString",
"maps",
"a",
"MapType",
"into",
"a",
"string",
"defined",
"by",
"run_probes",
".",
"sh"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/bpf/map.go#L166-L177 |
162,306 | cilium/cilium | pkg/workloads/defaults.go | EndpointCorrelationSleepTime | func EndpointCorrelationSleepTime(try int) time.Duration {
return time.Duration(try) * time.Second
} | go | func EndpointCorrelationSleepTime(try int) time.Duration {
return time.Duration(try) * time.Second
} | [
"func",
"EndpointCorrelationSleepTime",
"(",
"try",
"int",
")",
"time",
".",
"Duration",
"{",
"return",
"time",
".",
"Duration",
"(",
"try",
")",
"*",
"time",
".",
"Second",
"\n",
"}"
] | // EndpointCorrelationSleepTime returns the sleep time between correlation
// attempts | [
"EndpointCorrelationSleepTime",
"returns",
"the",
"sleep",
"time",
"between",
"correlation",
"attempts"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/workloads/defaults.go#L37-L39 |
162,307 | cilium/cilium | proxylib/memcached/text/parser.go | injectFromQueue | func (p *Parser) injectFromQueue() int {
injected := 0
for _, rep := range p.replyQueue {
if rep.denied {
injected++
p.injectDeniedMessage()
} else {
break
}
}
if injected > 0 {
p.replyQueue = p.replyQueue[injected:]
}
return injected * len(DeniedMsg)
} | go | func (p *Parser) injectFromQueue() int {
injected := 0
for _, rep := range p.replyQueue {
if rep.denied {
injected++
p.injectDeniedMessage()
} else {
break
}
}
if injected > 0 {
p.replyQueue = p.replyQueue[injected:]
}
return injected * len(DeniedMsg)
} | [
"func",
"(",
"p",
"*",
"Parser",
")",
"injectFromQueue",
"(",
")",
"int",
"{",
"injected",
":=",
"0",
"\n",
"for",
"_",
",",
"rep",
":=",
"range",
"p",
".",
"replyQueue",
"{",
"if",
"rep",
".",
"denied",
"{",
"injected",
"++",
"\n",
"p",
".",
"injectDeniedMessage",
"(",
")",
"\n",
"}",
"else",
"{",
"break",
"\n",
"}",
"\n\n",
"}",
"\n",
"if",
"injected",
">",
"0",
"{",
"p",
".",
"replyQueue",
"=",
"p",
".",
"replyQueue",
"[",
"injected",
":",
"]",
"\n",
"}",
"\n",
"return",
"injected",
"*",
"len",
"(",
"DeniedMsg",
")",
"\n",
"}"
] | // returns injected bytes | [
"returns",
"injected",
"bytes"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/proxylib/memcached/text/parser.go#L305-L320 |
162,308 | cilium/cilium | pkg/datapath/fake/node_addressing.go | NewIPv4OnlyNodeAddressing | func NewIPv4OnlyNodeAddressing() datapath.NodeAddressing {
return &fakeNodeAddressing{
ipv4: addressFamily{
router: net.ParseIP("1.1.1.2"),
primaryExternal: net.ParseIP("1.1.1.1"),
allocCIDR: cidr.MustParseCIDR("1.1.1.0/24"),
},
ipv6: addressFamily{},
}
} | go | func NewIPv4OnlyNodeAddressing() datapath.NodeAddressing {
return &fakeNodeAddressing{
ipv4: addressFamily{
router: net.ParseIP("1.1.1.2"),
primaryExternal: net.ParseIP("1.1.1.1"),
allocCIDR: cidr.MustParseCIDR("1.1.1.0/24"),
},
ipv6: addressFamily{},
}
} | [
"func",
"NewIPv4OnlyNodeAddressing",
"(",
")",
"datapath",
".",
"NodeAddressing",
"{",
"return",
"&",
"fakeNodeAddressing",
"{",
"ipv4",
":",
"addressFamily",
"{",
"router",
":",
"net",
".",
"ParseIP",
"(",
"\"",
"\"",
")",
",",
"primaryExternal",
":",
"net",
".",
"ParseIP",
"(",
"\"",
"\"",
")",
",",
"allocCIDR",
":",
"cidr",
".",
"MustParseCIDR",
"(",
"\"",
"\"",
")",
",",
"}",
",",
"ipv6",
":",
"addressFamily",
"{",
"}",
",",
"}",
"\n",
"}"
] | // NewIPv4OnlyNodeAddressing returns a new fake node addressing where IPv6 is
// disabled | [
"NewIPv4OnlyNodeAddressing",
"returns",
"a",
"new",
"fake",
"node",
"addressing",
"where",
"IPv6",
"is",
"disabled"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/fake/node_addressing.go#L44-L53 |
162,309 | cilium/cilium | pkg/datapath/fake/node_addressing.go | NewNodeAddressing | func NewNodeAddressing() datapath.NodeAddressing {
return &fakeNodeAddressing{
ipv4: addressFamily{
router: net.ParseIP("1.1.1.2"),
primaryExternal: net.ParseIP("1.1.1.1"),
allocCIDR: cidr.MustParseCIDR("1.1.1.0/24"),
},
ipv6: addressFamily{
router: net.ParseIP("cafe::2"),
primaryExternal: net.ParseIP("cafe::1"),
allocCIDR: cidr.MustParseCIDR("cafe::/96"),
},
}
} | go | func NewNodeAddressing() datapath.NodeAddressing {
return &fakeNodeAddressing{
ipv4: addressFamily{
router: net.ParseIP("1.1.1.2"),
primaryExternal: net.ParseIP("1.1.1.1"),
allocCIDR: cidr.MustParseCIDR("1.1.1.0/24"),
},
ipv6: addressFamily{
router: net.ParseIP("cafe::2"),
primaryExternal: net.ParseIP("cafe::1"),
allocCIDR: cidr.MustParseCIDR("cafe::/96"),
},
}
} | [
"func",
"NewNodeAddressing",
"(",
")",
"datapath",
".",
"NodeAddressing",
"{",
"return",
"&",
"fakeNodeAddressing",
"{",
"ipv4",
":",
"addressFamily",
"{",
"router",
":",
"net",
".",
"ParseIP",
"(",
"\"",
"\"",
")",
",",
"primaryExternal",
":",
"net",
".",
"ParseIP",
"(",
"\"",
"\"",
")",
",",
"allocCIDR",
":",
"cidr",
".",
"MustParseCIDR",
"(",
"\"",
"\"",
")",
",",
"}",
",",
"ipv6",
":",
"addressFamily",
"{",
"router",
":",
"net",
".",
"ParseIP",
"(",
"\"",
"\"",
")",
",",
"primaryExternal",
":",
"net",
".",
"ParseIP",
"(",
"\"",
"\"",
")",
",",
"allocCIDR",
":",
"cidr",
".",
"MustParseCIDR",
"(",
"\"",
"\"",
")",
",",
"}",
",",
"}",
"\n",
"}"
] | // NewNodeAddressing returns a new fake node addressing | [
"NewNodeAddressing",
"returns",
"a",
"new",
"fake",
"node",
"addressing"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/fake/node_addressing.go#L56-L69 |
162,310 | cilium/cilium | api/v1/client/endpoint/get_endpoint_id_labels_parameters.go | WithTimeout | func (o *GetEndpointIDLabelsParams) WithTimeout(timeout time.Duration) *GetEndpointIDLabelsParams {
o.SetTimeout(timeout)
return o
} | go | func (o *GetEndpointIDLabelsParams) WithTimeout(timeout time.Duration) *GetEndpointIDLabelsParams {
o.SetTimeout(timeout)
return o
} | [
"func",
"(",
"o",
"*",
"GetEndpointIDLabelsParams",
")",
"WithTimeout",
"(",
"timeout",
"time",
".",
"Duration",
")",
"*",
"GetEndpointIDLabelsParams",
"{",
"o",
".",
"SetTimeout",
"(",
"timeout",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithTimeout adds the timeout to the get endpoint ID labels params | [
"WithTimeout",
"adds",
"the",
"timeout",
"to",
"the",
"get",
"endpoint",
"ID",
"labels",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/endpoint/get_endpoint_id_labels_parameters.go#L88-L91 |
162,311 | cilium/cilium | api/v1/client/endpoint/get_endpoint_id_labels_parameters.go | WithContext | func (o *GetEndpointIDLabelsParams) WithContext(ctx context.Context) *GetEndpointIDLabelsParams {
o.SetContext(ctx)
return o
} | go | func (o *GetEndpointIDLabelsParams) WithContext(ctx context.Context) *GetEndpointIDLabelsParams {
o.SetContext(ctx)
return o
} | [
"func",
"(",
"o",
"*",
"GetEndpointIDLabelsParams",
")",
"WithContext",
"(",
"ctx",
"context",
".",
"Context",
")",
"*",
"GetEndpointIDLabelsParams",
"{",
"o",
".",
"SetContext",
"(",
"ctx",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithContext adds the context to the get endpoint ID labels params | [
"WithContext",
"adds",
"the",
"context",
"to",
"the",
"get",
"endpoint",
"ID",
"labels",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/endpoint/get_endpoint_id_labels_parameters.go#L99-L102 |
162,312 | cilium/cilium | api/v1/client/endpoint/get_endpoint_id_labels_parameters.go | WithHTTPClient | func (o *GetEndpointIDLabelsParams) WithHTTPClient(client *http.Client) *GetEndpointIDLabelsParams {
o.SetHTTPClient(client)
return o
} | go | func (o *GetEndpointIDLabelsParams) WithHTTPClient(client *http.Client) *GetEndpointIDLabelsParams {
o.SetHTTPClient(client)
return o
} | [
"func",
"(",
"o",
"*",
"GetEndpointIDLabelsParams",
")",
"WithHTTPClient",
"(",
"client",
"*",
"http",
".",
"Client",
")",
"*",
"GetEndpointIDLabelsParams",
"{",
"o",
".",
"SetHTTPClient",
"(",
"client",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithHTTPClient adds the HTTPClient to the get endpoint ID labels params | [
"WithHTTPClient",
"adds",
"the",
"HTTPClient",
"to",
"the",
"get",
"endpoint",
"ID",
"labels",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/endpoint/get_endpoint_id_labels_parameters.go#L110-L113 |
162,313 | cilium/cilium | api/v1/client/endpoint/get_endpoint_id_labels_parameters.go | WithID | func (o *GetEndpointIDLabelsParams) WithID(id string) *GetEndpointIDLabelsParams {
o.SetID(id)
return o
} | go | func (o *GetEndpointIDLabelsParams) WithID(id string) *GetEndpointIDLabelsParams {
o.SetID(id)
return o
} | [
"func",
"(",
"o",
"*",
"GetEndpointIDLabelsParams",
")",
"WithID",
"(",
"id",
"string",
")",
"*",
"GetEndpointIDLabelsParams",
"{",
"o",
".",
"SetID",
"(",
"id",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithID adds the id to the get endpoint ID labels params | [
"WithID",
"adds",
"the",
"id",
"to",
"the",
"get",
"endpoint",
"ID",
"labels",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/endpoint/get_endpoint_id_labels_parameters.go#L121-L124 |
162,314 | cilium/cilium | api/v1/server/restapi/service/get_service_responses.go | WithPayload | func (o *GetServiceOK) WithPayload(payload []*models.Service) *GetServiceOK {
o.Payload = payload
return o
} | go | func (o *GetServiceOK) WithPayload(payload []*models.Service) *GetServiceOK {
o.Payload = payload
return o
} | [
"func",
"(",
"o",
"*",
"GetServiceOK",
")",
"WithPayload",
"(",
"payload",
"[",
"]",
"*",
"models",
".",
"Service",
")",
"*",
"GetServiceOK",
"{",
"o",
".",
"Payload",
"=",
"payload",
"\n",
"return",
"o",
"\n",
"}"
] | // WithPayload adds the payload to the get service o k response | [
"WithPayload",
"adds",
"the",
"payload",
"to",
"the",
"get",
"service",
"o",
"k",
"response"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/server/restapi/service/get_service_responses.go#L38-L41 |
162,315 | cilium/cilium | pkg/uuid/uuid.go | NewUUID | func NewUUID() uuid.UUID {
uuidLock.Lock()
defer uuidLock.Unlock()
result := uuid.NewUUID()
// The UUID package is naive and can generate identical UUIDs if the
// time interval is quick enough.
// The UUID uses 100 ns increments so it's short enough to actively
// wait for a new value.
for uuid.Equal(lastUUID, result) == true {
result = uuid.NewUUID()
}
lastUUID = result
return result
} | go | func NewUUID() uuid.UUID {
uuidLock.Lock()
defer uuidLock.Unlock()
result := uuid.NewUUID()
// The UUID package is naive and can generate identical UUIDs if the
// time interval is quick enough.
// The UUID uses 100 ns increments so it's short enough to actively
// wait for a new value.
for uuid.Equal(lastUUID, result) == true {
result = uuid.NewUUID()
}
lastUUID = result
return result
} | [
"func",
"NewUUID",
"(",
")",
"uuid",
".",
"UUID",
"{",
"uuidLock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"uuidLock",
".",
"Unlock",
"(",
")",
"\n",
"result",
":=",
"uuid",
".",
"NewUUID",
"(",
")",
"\n",
"// The UUID package is naive and can generate identical UUIDs if the",
"// time interval is quick enough.",
"// The UUID uses 100 ns increments so it's short enough to actively",
"// wait for a new value.",
"for",
"uuid",
".",
"Equal",
"(",
"lastUUID",
",",
"result",
")",
"==",
"true",
"{",
"result",
"=",
"uuid",
".",
"NewUUID",
"(",
")",
"\n",
"}",
"\n",
"lastUUID",
"=",
"result",
"\n",
"return",
"result",
"\n",
"}"
] | // NewUUID returns a new UUID | [
"NewUUID",
"returns",
"a",
"new",
"UUID"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/uuid/uuid.go#L29-L42 |
162,316 | cilium/cilium | api/v1/client/endpoint/patch_endpoint_id_config_parameters.go | WithTimeout | func (o *PatchEndpointIDConfigParams) WithTimeout(timeout time.Duration) *PatchEndpointIDConfigParams {
o.SetTimeout(timeout)
return o
} | go | func (o *PatchEndpointIDConfigParams) WithTimeout(timeout time.Duration) *PatchEndpointIDConfigParams {
o.SetTimeout(timeout)
return o
} | [
"func",
"(",
"o",
"*",
"PatchEndpointIDConfigParams",
")",
"WithTimeout",
"(",
"timeout",
"time",
".",
"Duration",
")",
"*",
"PatchEndpointIDConfigParams",
"{",
"o",
".",
"SetTimeout",
"(",
"timeout",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithTimeout adds the timeout to the patch endpoint ID config params | [
"WithTimeout",
"adds",
"the",
"timeout",
"to",
"the",
"patch",
"endpoint",
"ID",
"config",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/endpoint/patch_endpoint_id_config_parameters.go#L92-L95 |
162,317 | cilium/cilium | api/v1/client/endpoint/patch_endpoint_id_config_parameters.go | WithContext | func (o *PatchEndpointIDConfigParams) WithContext(ctx context.Context) *PatchEndpointIDConfigParams {
o.SetContext(ctx)
return o
} | go | func (o *PatchEndpointIDConfigParams) WithContext(ctx context.Context) *PatchEndpointIDConfigParams {
o.SetContext(ctx)
return o
} | [
"func",
"(",
"o",
"*",
"PatchEndpointIDConfigParams",
")",
"WithContext",
"(",
"ctx",
"context",
".",
"Context",
")",
"*",
"PatchEndpointIDConfigParams",
"{",
"o",
".",
"SetContext",
"(",
"ctx",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithContext adds the context to the patch endpoint ID config params | [
"WithContext",
"adds",
"the",
"context",
"to",
"the",
"patch",
"endpoint",
"ID",
"config",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/endpoint/patch_endpoint_id_config_parameters.go#L103-L106 |
162,318 | cilium/cilium | api/v1/client/endpoint/patch_endpoint_id_config_parameters.go | WithHTTPClient | func (o *PatchEndpointIDConfigParams) WithHTTPClient(client *http.Client) *PatchEndpointIDConfigParams {
o.SetHTTPClient(client)
return o
} | go | func (o *PatchEndpointIDConfigParams) WithHTTPClient(client *http.Client) *PatchEndpointIDConfigParams {
o.SetHTTPClient(client)
return o
} | [
"func",
"(",
"o",
"*",
"PatchEndpointIDConfigParams",
")",
"WithHTTPClient",
"(",
"client",
"*",
"http",
".",
"Client",
")",
"*",
"PatchEndpointIDConfigParams",
"{",
"o",
".",
"SetHTTPClient",
"(",
"client",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithHTTPClient adds the HTTPClient to the patch endpoint ID config params | [
"WithHTTPClient",
"adds",
"the",
"HTTPClient",
"to",
"the",
"patch",
"endpoint",
"ID",
"config",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/endpoint/patch_endpoint_id_config_parameters.go#L114-L117 |
162,319 | cilium/cilium | api/v1/client/endpoint/patch_endpoint_id_config_parameters.go | WithEndpointConfiguration | func (o *PatchEndpointIDConfigParams) WithEndpointConfiguration(endpointConfiguration *models.EndpointConfigurationSpec) *PatchEndpointIDConfigParams {
o.SetEndpointConfiguration(endpointConfiguration)
return o
} | go | func (o *PatchEndpointIDConfigParams) WithEndpointConfiguration(endpointConfiguration *models.EndpointConfigurationSpec) *PatchEndpointIDConfigParams {
o.SetEndpointConfiguration(endpointConfiguration)
return o
} | [
"func",
"(",
"o",
"*",
"PatchEndpointIDConfigParams",
")",
"WithEndpointConfiguration",
"(",
"endpointConfiguration",
"*",
"models",
".",
"EndpointConfigurationSpec",
")",
"*",
"PatchEndpointIDConfigParams",
"{",
"o",
".",
"SetEndpointConfiguration",
"(",
"endpointConfiguration",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithEndpointConfiguration adds the endpointConfiguration to the patch endpoint ID config params | [
"WithEndpointConfiguration",
"adds",
"the",
"endpointConfiguration",
"to",
"the",
"patch",
"endpoint",
"ID",
"config",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/endpoint/patch_endpoint_id_config_parameters.go#L125-L128 |
162,320 | cilium/cilium | api/v1/client/endpoint/patch_endpoint_id_config_parameters.go | WithID | func (o *PatchEndpointIDConfigParams) WithID(id string) *PatchEndpointIDConfigParams {
o.SetID(id)
return o
} | go | func (o *PatchEndpointIDConfigParams) WithID(id string) *PatchEndpointIDConfigParams {
o.SetID(id)
return o
} | [
"func",
"(",
"o",
"*",
"PatchEndpointIDConfigParams",
")",
"WithID",
"(",
"id",
"string",
")",
"*",
"PatchEndpointIDConfigParams",
"{",
"o",
".",
"SetID",
"(",
"id",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithID adds the id to the patch endpoint ID config params | [
"WithID",
"adds",
"the",
"id",
"to",
"the",
"patch",
"endpoint",
"ID",
"config",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/endpoint/patch_endpoint_id_config_parameters.go#L136-L139 |
162,321 | cilium/cilium | pkg/k8s/client.go | createConfig | func createConfig(endpoint, kubeCfgPath string) (*rest.Config, error) {
userAgent := fmt.Sprintf("Cilium %s", version.Version)
// If the endpoint and the kubeCfgPath are empty then we can try getting
// the rest.Config from the InClusterConfig
if endpoint == "" && kubeCfgPath == "" {
config, err := rest.InClusterConfig()
if err != nil {
return nil, err
}
config.UserAgent = userAgent
return config, nil
}
if kubeCfgPath != "" {
config, err := clientcmd.BuildConfigFromFlags("", kubeCfgPath)
if err != nil {
return nil, err
}
config.UserAgent = userAgent
return config, nil
}
config := &rest.Config{Host: endpoint, UserAgent: userAgent}
err := rest.SetKubernetesDefaults(config)
return config, err
} | go | func createConfig(endpoint, kubeCfgPath string) (*rest.Config, error) {
userAgent := fmt.Sprintf("Cilium %s", version.Version)
// If the endpoint and the kubeCfgPath are empty then we can try getting
// the rest.Config from the InClusterConfig
if endpoint == "" && kubeCfgPath == "" {
config, err := rest.InClusterConfig()
if err != nil {
return nil, err
}
config.UserAgent = userAgent
return config, nil
}
if kubeCfgPath != "" {
config, err := clientcmd.BuildConfigFromFlags("", kubeCfgPath)
if err != nil {
return nil, err
}
config.UserAgent = userAgent
return config, nil
}
config := &rest.Config{Host: endpoint, UserAgent: userAgent}
err := rest.SetKubernetesDefaults(config)
return config, err
} | [
"func",
"createConfig",
"(",
"endpoint",
",",
"kubeCfgPath",
"string",
")",
"(",
"*",
"rest",
".",
"Config",
",",
"error",
")",
"{",
"userAgent",
":=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"version",
".",
"Version",
")",
"\n\n",
"// If the endpoint and the kubeCfgPath are empty then we can try getting",
"// the rest.Config from the InClusterConfig",
"if",
"endpoint",
"==",
"\"",
"\"",
"&&",
"kubeCfgPath",
"==",
"\"",
"\"",
"{",
"config",
",",
"err",
":=",
"rest",
".",
"InClusterConfig",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"config",
".",
"UserAgent",
"=",
"userAgent",
"\n",
"return",
"config",
",",
"nil",
"\n",
"}",
"\n\n",
"if",
"kubeCfgPath",
"!=",
"\"",
"\"",
"{",
"config",
",",
"err",
":=",
"clientcmd",
".",
"BuildConfigFromFlags",
"(",
"\"",
"\"",
",",
"kubeCfgPath",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"config",
".",
"UserAgent",
"=",
"userAgent",
"\n",
"return",
"config",
",",
"nil",
"\n",
"}",
"\n\n",
"config",
":=",
"&",
"rest",
".",
"Config",
"{",
"Host",
":",
"endpoint",
",",
"UserAgent",
":",
"userAgent",
"}",
"\n",
"err",
":=",
"rest",
".",
"SetKubernetesDefaults",
"(",
"config",
")",
"\n\n",
"return",
"config",
",",
"err",
"\n",
"}"
] | // CreateConfig creates a rest.Config for a given endpoint using a kubeconfig file. | [
"CreateConfig",
"creates",
"a",
"rest",
".",
"Config",
"for",
"a",
"given",
"endpoint",
"using",
"a",
"kubeconfig",
"file",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/k8s/client.go#L47-L74 |
162,322 | cilium/cilium | pkg/k8s/client.go | CreateConfigFromAgentResponse | func CreateConfigFromAgentResponse(resp *models.DaemonConfiguration) (*rest.Config, error) {
return createConfig(resp.Status.K8sEndpoint, resp.Status.K8sConfiguration)
} | go | func CreateConfigFromAgentResponse(resp *models.DaemonConfiguration) (*rest.Config, error) {
return createConfig(resp.Status.K8sEndpoint, resp.Status.K8sConfiguration)
} | [
"func",
"CreateConfigFromAgentResponse",
"(",
"resp",
"*",
"models",
".",
"DaemonConfiguration",
")",
"(",
"*",
"rest",
".",
"Config",
",",
"error",
")",
"{",
"return",
"createConfig",
"(",
"resp",
".",
"Status",
".",
"K8sEndpoint",
",",
"resp",
".",
"Status",
".",
"K8sConfiguration",
")",
"\n",
"}"
] | // CreateConfigFromAgentResponse creates a client configuration from a
// models.DaemonConfigurationResponse | [
"CreateConfigFromAgentResponse",
"creates",
"a",
"client",
"configuration",
"from",
"a",
"models",
".",
"DaemonConfigurationResponse"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/k8s/client.go#L78-L80 |
162,323 | cilium/cilium | pkg/k8s/client.go | CreateClient | func CreateClient(config *rest.Config) (*kubernetes.Clientset, error) {
cs, err := kubernetes.NewForConfig(config)
if err != nil {
return nil, err
}
stop := make(chan struct{})
timeout := time.NewTimer(time.Minute)
defer timeout.Stop()
wait.Until(func() {
// FIXME: Use config.String() when we rebase to latest go-client
log.WithField("host", config.Host).Info("Establishing connection to apiserver")
err = isConnReady(cs)
if err == nil {
close(stop)
return
}
select {
case <-timeout.C:
log.WithError(err).WithField(logfields.IPAddr, config.Host).Error("Unable to contact k8s api-server")
close(stop)
default:
}
}, 5*time.Second, stop)
if err == nil {
log.Info("Connected to apiserver")
}
return cs, err
} | go | func CreateClient(config *rest.Config) (*kubernetes.Clientset, error) {
cs, err := kubernetes.NewForConfig(config)
if err != nil {
return nil, err
}
stop := make(chan struct{})
timeout := time.NewTimer(time.Minute)
defer timeout.Stop()
wait.Until(func() {
// FIXME: Use config.String() when we rebase to latest go-client
log.WithField("host", config.Host).Info("Establishing connection to apiserver")
err = isConnReady(cs)
if err == nil {
close(stop)
return
}
select {
case <-timeout.C:
log.WithError(err).WithField(logfields.IPAddr, config.Host).Error("Unable to contact k8s api-server")
close(stop)
default:
}
}, 5*time.Second, stop)
if err == nil {
log.Info("Connected to apiserver")
}
return cs, err
} | [
"func",
"CreateClient",
"(",
"config",
"*",
"rest",
".",
"Config",
")",
"(",
"*",
"kubernetes",
".",
"Clientset",
",",
"error",
")",
"{",
"cs",
",",
"err",
":=",
"kubernetes",
".",
"NewForConfig",
"(",
"config",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"stop",
":=",
"make",
"(",
"chan",
"struct",
"{",
"}",
")",
"\n",
"timeout",
":=",
"time",
".",
"NewTimer",
"(",
"time",
".",
"Minute",
")",
"\n",
"defer",
"timeout",
".",
"Stop",
"(",
")",
"\n",
"wait",
".",
"Until",
"(",
"func",
"(",
")",
"{",
"// FIXME: Use config.String() when we rebase to latest go-client",
"log",
".",
"WithField",
"(",
"\"",
"\"",
",",
"config",
".",
"Host",
")",
".",
"Info",
"(",
"\"",
"\"",
")",
"\n",
"err",
"=",
"isConnReady",
"(",
"cs",
")",
"\n",
"if",
"err",
"==",
"nil",
"{",
"close",
"(",
"stop",
")",
"\n",
"return",
"\n",
"}",
"\n",
"select",
"{",
"case",
"<-",
"timeout",
".",
"C",
":",
"log",
".",
"WithError",
"(",
"err",
")",
".",
"WithField",
"(",
"logfields",
".",
"IPAddr",
",",
"config",
".",
"Host",
")",
".",
"Error",
"(",
"\"",
"\"",
")",
"\n",
"close",
"(",
"stop",
")",
"\n",
"default",
":",
"}",
"\n",
"}",
",",
"5",
"*",
"time",
".",
"Second",
",",
"stop",
")",
"\n",
"if",
"err",
"==",
"nil",
"{",
"log",
".",
"Info",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"return",
"cs",
",",
"err",
"\n",
"}"
] | // CreateClient creates a new client to access the Kubernetes API | [
"CreateClient",
"creates",
"a",
"new",
"client",
"to",
"access",
"the",
"Kubernetes",
"API"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/k8s/client.go#L89-L116 |
162,324 | cilium/cilium | pkg/k8s/client.go | isConnReady | func isConnReady(c *kubernetes.Clientset) error {
_, err := c.CoreV1().ComponentStatuses().Get("controller-manager", metav1.GetOptions{})
return err
} | go | func isConnReady(c *kubernetes.Clientset) error {
_, err := c.CoreV1().ComponentStatuses().Get("controller-manager", metav1.GetOptions{})
return err
} | [
"func",
"isConnReady",
"(",
"c",
"*",
"kubernetes",
".",
"Clientset",
")",
"error",
"{",
"_",
",",
"err",
":=",
"c",
".",
"CoreV1",
"(",
")",
".",
"ComponentStatuses",
"(",
")",
".",
"Get",
"(",
"\"",
"\"",
",",
"metav1",
".",
"GetOptions",
"{",
"}",
")",
"\n",
"return",
"err",
"\n",
"}"
] | // isConnReady returns the err for the controller-manager status | [
"isConnReady",
"returns",
"the",
"err",
"for",
"the",
"controller",
"-",
"manager",
"status"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/k8s/client.go#L119-L122 |
162,325 | cilium/cilium | pkg/maps/lbmap/bpfservice.go | getBackendsV2 | func (b *bpfService) getBackendsV2() map[BackendAddrID]ServiceValue {
b.mutex.RLock()
defer b.mutex.RUnlock()
backends := make(map[BackendAddrID]ServiceValue, len(b.backendsV2))
for addrID, backend := range b.backendsV2 {
backends[addrID] = backend
}
return backends
} | go | func (b *bpfService) getBackendsV2() map[BackendAddrID]ServiceValue {
b.mutex.RLock()
defer b.mutex.RUnlock()
backends := make(map[BackendAddrID]ServiceValue, len(b.backendsV2))
for addrID, backend := range b.backendsV2 {
backends[addrID] = backend
}
return backends
} | [
"func",
"(",
"b",
"*",
"bpfService",
")",
"getBackendsV2",
"(",
")",
"map",
"[",
"BackendAddrID",
"]",
"ServiceValue",
"{",
"b",
".",
"mutex",
".",
"RLock",
"(",
")",
"\n",
"defer",
"b",
".",
"mutex",
".",
"RUnlock",
"(",
")",
"\n\n",
"backends",
":=",
"make",
"(",
"map",
"[",
"BackendAddrID",
"]",
"ServiceValue",
",",
"len",
"(",
"b",
".",
"backendsV2",
")",
")",
"\n",
"for",
"addrID",
",",
"backend",
":=",
"range",
"b",
".",
"backendsV2",
"{",
"backends",
"[",
"addrID",
"]",
"=",
"backend",
"\n",
"}",
"\n\n",
"return",
"backends",
"\n",
"}"
] | // getBackendsV2 makes a copy of backendsV2, so that they are safe to use
// after the bpfService lock has been released. | [
"getBackendsV2",
"makes",
"a",
"copy",
"of",
"backendsV2",
"so",
"that",
"they",
"are",
"safe",
"to",
"use",
"after",
"the",
"bpfService",
"lock",
"has",
"been",
"released",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/lbmap/bpfservice.go#L166-L176 |
162,326 | cilium/cilium | pkg/maps/lbmap/bpfservice.go | restoreService | func (l *lbmapCache) restoreService(svc loadbalancer.LBSVC, v2Exists bool) error {
l.mutex.Lock()
defer l.mutex.Unlock()
serviceKey, serviceValues, err := LBSVC2ServiceKeynValue(svc)
if err != nil {
return err
}
frontendID := serviceKey.String()
bpfSvc, ok := l.entries[frontendID]
if !ok {
bpfSvc = newBpfService(serviceKey)
l.entries[frontendID] = bpfSvc
}
if option.Config.EnableLegacyServices {
for index, backend := range serviceValues {
b := &bpfBackend{
id: backend.BackendAddrID(),
bpfValue: backend,
}
if _, ok := bpfSvc.uniqueBackends[backend.BackendAddrID()]; ok {
b.isHole = true
} else {
bpfSvc.uniqueBackends[backend.BackendAddrID()] = backend
bpfSvc.slaveSlotByBackendAddrID[backend.BackendAddrID()] = index + 1
}
bpfSvc.backendsByMapIndex[index+1] = b
}
}
if !option.Config.EnableLegacyServices || v2Exists {
for _, backend := range serviceValues {
addrID := backend.BackendAddrID()
if _, found := bpfSvc.backendsV2[addrID]; !found {
l.addBackendV2Locked(addrID)
}
bpfSvc.backendsV2[addrID] = backend
}
}
return nil
} | go | func (l *lbmapCache) restoreService(svc loadbalancer.LBSVC, v2Exists bool) error {
l.mutex.Lock()
defer l.mutex.Unlock()
serviceKey, serviceValues, err := LBSVC2ServiceKeynValue(svc)
if err != nil {
return err
}
frontendID := serviceKey.String()
bpfSvc, ok := l.entries[frontendID]
if !ok {
bpfSvc = newBpfService(serviceKey)
l.entries[frontendID] = bpfSvc
}
if option.Config.EnableLegacyServices {
for index, backend := range serviceValues {
b := &bpfBackend{
id: backend.BackendAddrID(),
bpfValue: backend,
}
if _, ok := bpfSvc.uniqueBackends[backend.BackendAddrID()]; ok {
b.isHole = true
} else {
bpfSvc.uniqueBackends[backend.BackendAddrID()] = backend
bpfSvc.slaveSlotByBackendAddrID[backend.BackendAddrID()] = index + 1
}
bpfSvc.backendsByMapIndex[index+1] = b
}
}
if !option.Config.EnableLegacyServices || v2Exists {
for _, backend := range serviceValues {
addrID := backend.BackendAddrID()
if _, found := bpfSvc.backendsV2[addrID]; !found {
l.addBackendV2Locked(addrID)
}
bpfSvc.backendsV2[addrID] = backend
}
}
return nil
} | [
"func",
"(",
"l",
"*",
"lbmapCache",
")",
"restoreService",
"(",
"svc",
"loadbalancer",
".",
"LBSVC",
",",
"v2Exists",
"bool",
")",
"error",
"{",
"l",
".",
"mutex",
".",
"Lock",
"(",
")",
"\n",
"defer",
"l",
".",
"mutex",
".",
"Unlock",
"(",
")",
"\n\n",
"serviceKey",
",",
"serviceValues",
",",
"err",
":=",
"LBSVC2ServiceKeynValue",
"(",
"svc",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"frontendID",
":=",
"serviceKey",
".",
"String",
"(",
")",
"\n\n",
"bpfSvc",
",",
"ok",
":=",
"l",
".",
"entries",
"[",
"frontendID",
"]",
"\n",
"if",
"!",
"ok",
"{",
"bpfSvc",
"=",
"newBpfService",
"(",
"serviceKey",
")",
"\n",
"l",
".",
"entries",
"[",
"frontendID",
"]",
"=",
"bpfSvc",
"\n",
"}",
"\n\n",
"if",
"option",
".",
"Config",
".",
"EnableLegacyServices",
"{",
"for",
"index",
",",
"backend",
":=",
"range",
"serviceValues",
"{",
"b",
":=",
"&",
"bpfBackend",
"{",
"id",
":",
"backend",
".",
"BackendAddrID",
"(",
")",
",",
"bpfValue",
":",
"backend",
",",
"}",
"\n",
"if",
"_",
",",
"ok",
":=",
"bpfSvc",
".",
"uniqueBackends",
"[",
"backend",
".",
"BackendAddrID",
"(",
")",
"]",
";",
"ok",
"{",
"b",
".",
"isHole",
"=",
"true",
"\n",
"}",
"else",
"{",
"bpfSvc",
".",
"uniqueBackends",
"[",
"backend",
".",
"BackendAddrID",
"(",
")",
"]",
"=",
"backend",
"\n",
"bpfSvc",
".",
"slaveSlotByBackendAddrID",
"[",
"backend",
".",
"BackendAddrID",
"(",
")",
"]",
"=",
"index",
"+",
"1",
"\n",
"}",
"\n\n",
"bpfSvc",
".",
"backendsByMapIndex",
"[",
"index",
"+",
"1",
"]",
"=",
"b",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"!",
"option",
".",
"Config",
".",
"EnableLegacyServices",
"||",
"v2Exists",
"{",
"for",
"_",
",",
"backend",
":=",
"range",
"serviceValues",
"{",
"addrID",
":=",
"backend",
".",
"BackendAddrID",
"(",
")",
"\n",
"if",
"_",
",",
"found",
":=",
"bpfSvc",
".",
"backendsV2",
"[",
"addrID",
"]",
";",
"!",
"found",
"{",
"l",
".",
"addBackendV2Locked",
"(",
"addrID",
")",
"\n",
"}",
"\n",
"bpfSvc",
".",
"backendsV2",
"[",
"addrID",
"]",
"=",
"backend",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // restoreService restores service cache of the given legacy and v2 service. | [
"restoreService",
"restores",
"service",
"cache",
"of",
"the",
"given",
"legacy",
"and",
"v2",
"service",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/lbmap/bpfservice.go#L202-L247 |
162,327 | cilium/cilium | pkg/maps/lbmap/bpfservice.go | prepareUpdate | func (l *lbmapCache) prepareUpdate(fe ServiceKey, backends []ServiceValue) (
*bpfService, map[loadbalancer.BackendID]ServiceValue, []loadbalancer.BackendID, error) {
l.mutex.Lock()
defer l.mutex.Unlock()
frontendID := fe.String()
bpfSvc, ok := l.entries[frontendID]
if !ok {
bpfSvc = newBpfService(fe)
l.entries[frontendID] = bpfSvc
}
newBackendsMap := createBackendsMap(backends)
toRemoveBackendIDs := []loadbalancer.BackendID{}
toAddBackendIDs := map[loadbalancer.BackendID]ServiceValue{}
// Step 1: Delete all backends that no longer exist. This will not
// actually remove the backends but overwrite all slave slots that
// point to the removed backend with the backend that has the least
// duplicated slots.
if option.Config.EnableLegacyServices {
for addrID, b := range bpfSvc.uniqueBackends {
if _, ok := newBackendsMap[addrID]; !ok {
bpfSvc.deleteBackend(b)
delete(bpfSvc.slaveSlotByBackendAddrID, addrID)
}
}
}
// Step 2: Delete all backends that no longer exist in the service v2.
for addrID := range bpfSvc.backendsV2 {
if _, ok := newBackendsMap[addrID]; !ok {
isLastInstanceRemoved, err := l.delBackendV2Locked(addrID)
if err != nil {
return nil, nil, nil, err
}
if isLastInstanceRemoved {
toRemoveBackendIDs = append(toRemoveBackendIDs,
l.backendIDByAddrID[addrID])
delete(l.backendIDByAddrID, addrID)
}
delete(bpfSvc.backendsV2, addrID)
}
}
if option.Config.EnableLegacyServices {
// Step 3: Add all backends that don't exist in the legacy service yet.
for _, b := range backends {
if _, ok := bpfSvc.uniqueBackends[b.BackendAddrID()]; !ok {
addrID := b.BackendAddrID()
pos := bpfSvc.addBackend(b)
bpfSvc.slaveSlotByBackendAddrID[addrID] = pos
}
}
}
// Step 4: Add all backends that don't exist in the service v2 yet.
for _, b := range backends {
addrID := b.BackendAddrID()
if _, ok := bpfSvc.backendsV2[addrID]; !ok {
bpfSvc.backendsV2[addrID] = b
isNew := l.addBackendV2Locked(addrID)
if isNew {
toAddBackendIDs[l.backendIDByAddrID[addrID]] = b
}
}
}
return bpfSvc, toAddBackendIDs, toRemoveBackendIDs, nil
} | go | func (l *lbmapCache) prepareUpdate(fe ServiceKey, backends []ServiceValue) (
*bpfService, map[loadbalancer.BackendID]ServiceValue, []loadbalancer.BackendID, error) {
l.mutex.Lock()
defer l.mutex.Unlock()
frontendID := fe.String()
bpfSvc, ok := l.entries[frontendID]
if !ok {
bpfSvc = newBpfService(fe)
l.entries[frontendID] = bpfSvc
}
newBackendsMap := createBackendsMap(backends)
toRemoveBackendIDs := []loadbalancer.BackendID{}
toAddBackendIDs := map[loadbalancer.BackendID]ServiceValue{}
// Step 1: Delete all backends that no longer exist. This will not
// actually remove the backends but overwrite all slave slots that
// point to the removed backend with the backend that has the least
// duplicated slots.
if option.Config.EnableLegacyServices {
for addrID, b := range bpfSvc.uniqueBackends {
if _, ok := newBackendsMap[addrID]; !ok {
bpfSvc.deleteBackend(b)
delete(bpfSvc.slaveSlotByBackendAddrID, addrID)
}
}
}
// Step 2: Delete all backends that no longer exist in the service v2.
for addrID := range bpfSvc.backendsV2 {
if _, ok := newBackendsMap[addrID]; !ok {
isLastInstanceRemoved, err := l.delBackendV2Locked(addrID)
if err != nil {
return nil, nil, nil, err
}
if isLastInstanceRemoved {
toRemoveBackendIDs = append(toRemoveBackendIDs,
l.backendIDByAddrID[addrID])
delete(l.backendIDByAddrID, addrID)
}
delete(bpfSvc.backendsV2, addrID)
}
}
if option.Config.EnableLegacyServices {
// Step 3: Add all backends that don't exist in the legacy service yet.
for _, b := range backends {
if _, ok := bpfSvc.uniqueBackends[b.BackendAddrID()]; !ok {
addrID := b.BackendAddrID()
pos := bpfSvc.addBackend(b)
bpfSvc.slaveSlotByBackendAddrID[addrID] = pos
}
}
}
// Step 4: Add all backends that don't exist in the service v2 yet.
for _, b := range backends {
addrID := b.BackendAddrID()
if _, ok := bpfSvc.backendsV2[addrID]; !ok {
bpfSvc.backendsV2[addrID] = b
isNew := l.addBackendV2Locked(addrID)
if isNew {
toAddBackendIDs[l.backendIDByAddrID[addrID]] = b
}
}
}
return bpfSvc, toAddBackendIDs, toRemoveBackendIDs, nil
} | [
"func",
"(",
"l",
"*",
"lbmapCache",
")",
"prepareUpdate",
"(",
"fe",
"ServiceKey",
",",
"backends",
"[",
"]",
"ServiceValue",
")",
"(",
"*",
"bpfService",
",",
"map",
"[",
"loadbalancer",
".",
"BackendID",
"]",
"ServiceValue",
",",
"[",
"]",
"loadbalancer",
".",
"BackendID",
",",
"error",
")",
"{",
"l",
".",
"mutex",
".",
"Lock",
"(",
")",
"\n",
"defer",
"l",
".",
"mutex",
".",
"Unlock",
"(",
")",
"\n\n",
"frontendID",
":=",
"fe",
".",
"String",
"(",
")",
"\n\n",
"bpfSvc",
",",
"ok",
":=",
"l",
".",
"entries",
"[",
"frontendID",
"]",
"\n",
"if",
"!",
"ok",
"{",
"bpfSvc",
"=",
"newBpfService",
"(",
"fe",
")",
"\n",
"l",
".",
"entries",
"[",
"frontendID",
"]",
"=",
"bpfSvc",
"\n",
"}",
"\n\n",
"newBackendsMap",
":=",
"createBackendsMap",
"(",
"backends",
")",
"\n",
"toRemoveBackendIDs",
":=",
"[",
"]",
"loadbalancer",
".",
"BackendID",
"{",
"}",
"\n",
"toAddBackendIDs",
":=",
"map",
"[",
"loadbalancer",
".",
"BackendID",
"]",
"ServiceValue",
"{",
"}",
"\n\n",
"// Step 1: Delete all backends that no longer exist. This will not",
"// actually remove the backends but overwrite all slave slots that",
"// point to the removed backend with the backend that has the least",
"// duplicated slots.",
"if",
"option",
".",
"Config",
".",
"EnableLegacyServices",
"{",
"for",
"addrID",
",",
"b",
":=",
"range",
"bpfSvc",
".",
"uniqueBackends",
"{",
"if",
"_",
",",
"ok",
":=",
"newBackendsMap",
"[",
"addrID",
"]",
";",
"!",
"ok",
"{",
"bpfSvc",
".",
"deleteBackend",
"(",
"b",
")",
"\n",
"delete",
"(",
"bpfSvc",
".",
"slaveSlotByBackendAddrID",
",",
"addrID",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"// Step 2: Delete all backends that no longer exist in the service v2.",
"for",
"addrID",
":=",
"range",
"bpfSvc",
".",
"backendsV2",
"{",
"if",
"_",
",",
"ok",
":=",
"newBackendsMap",
"[",
"addrID",
"]",
";",
"!",
"ok",
"{",
"isLastInstanceRemoved",
",",
"err",
":=",
"l",
".",
"delBackendV2Locked",
"(",
"addrID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"isLastInstanceRemoved",
"{",
"toRemoveBackendIDs",
"=",
"append",
"(",
"toRemoveBackendIDs",
",",
"l",
".",
"backendIDByAddrID",
"[",
"addrID",
"]",
")",
"\n",
"delete",
"(",
"l",
".",
"backendIDByAddrID",
",",
"addrID",
")",
"\n",
"}",
"\n",
"delete",
"(",
"bpfSvc",
".",
"backendsV2",
",",
"addrID",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"option",
".",
"Config",
".",
"EnableLegacyServices",
"{",
"// Step 3: Add all backends that don't exist in the legacy service yet.",
"for",
"_",
",",
"b",
":=",
"range",
"backends",
"{",
"if",
"_",
",",
"ok",
":=",
"bpfSvc",
".",
"uniqueBackends",
"[",
"b",
".",
"BackendAddrID",
"(",
")",
"]",
";",
"!",
"ok",
"{",
"addrID",
":=",
"b",
".",
"BackendAddrID",
"(",
")",
"\n",
"pos",
":=",
"bpfSvc",
".",
"addBackend",
"(",
"b",
")",
"\n",
"bpfSvc",
".",
"slaveSlotByBackendAddrID",
"[",
"addrID",
"]",
"=",
"pos",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"// Step 4: Add all backends that don't exist in the service v2 yet.",
"for",
"_",
",",
"b",
":=",
"range",
"backends",
"{",
"addrID",
":=",
"b",
".",
"BackendAddrID",
"(",
")",
"\n",
"if",
"_",
",",
"ok",
":=",
"bpfSvc",
".",
"backendsV2",
"[",
"addrID",
"]",
";",
"!",
"ok",
"{",
"bpfSvc",
".",
"backendsV2",
"[",
"addrID",
"]",
"=",
"b",
"\n",
"isNew",
":=",
"l",
".",
"addBackendV2Locked",
"(",
"addrID",
")",
"\n",
"if",
"isNew",
"{",
"toAddBackendIDs",
"[",
"l",
".",
"backendIDByAddrID",
"[",
"addrID",
"]",
"]",
"=",
"b",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"bpfSvc",
",",
"toAddBackendIDs",
",",
"toRemoveBackendIDs",
",",
"nil",
"\n",
"}"
] | // prepareUpdate prepares the caches to reflect the changes in the given svc.
// The given backends should not contain a service value of a master service. | [
"prepareUpdate",
"prepares",
"the",
"caches",
"to",
"reflect",
"the",
"changes",
"in",
"the",
"given",
"svc",
".",
"The",
"given",
"backends",
"should",
"not",
"contain",
"a",
"service",
"value",
"of",
"a",
"master",
"service",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/lbmap/bpfservice.go#L251-L320 |
162,328 | cilium/cilium | pkg/maps/lbmap/bpfservice.go | addBackendV2Locked | func (l *lbmapCache) addBackendV2Locked(addrID BackendAddrID) bool {
l.backendRefCount[addrID]++
return l.backendRefCount[addrID] == 1
} | go | func (l *lbmapCache) addBackendV2Locked(addrID BackendAddrID) bool {
l.backendRefCount[addrID]++
return l.backendRefCount[addrID] == 1
} | [
"func",
"(",
"l",
"*",
"lbmapCache",
")",
"addBackendV2Locked",
"(",
"addrID",
"BackendAddrID",
")",
"bool",
"{",
"l",
".",
"backendRefCount",
"[",
"addrID",
"]",
"++",
"\n",
"return",
"l",
".",
"backendRefCount",
"[",
"addrID",
"]",
"==",
"1",
"\n",
"}"
] | // addBackendV2Locked increments a ref count for the given backend and returns
// whether any instance of the backend existed before. | [
"addBackendV2Locked",
"increments",
"a",
"ref",
"count",
"for",
"the",
"given",
"backend",
"and",
"returns",
"whether",
"any",
"instance",
"of",
"the",
"backend",
"existed",
"before",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/lbmap/bpfservice.go#L348-L351 |
162,329 | cilium/cilium | pkg/maps/lbmap/bpfservice.go | delBackendV2Locked | func (l *lbmapCache) delBackendV2Locked(addrID BackendAddrID) (bool, error) {
count, found := l.backendRefCount[addrID]
if !found {
return false, fmt.Errorf("backend %s not found", addrID)
}
if count == 1 {
delete(l.backendRefCount, addrID)
return true, nil
}
l.backendRefCount[addrID]--
return false, nil
} | go | func (l *lbmapCache) delBackendV2Locked(addrID BackendAddrID) (bool, error) {
count, found := l.backendRefCount[addrID]
if !found {
return false, fmt.Errorf("backend %s not found", addrID)
}
if count == 1 {
delete(l.backendRefCount, addrID)
return true, nil
}
l.backendRefCount[addrID]--
return false, nil
} | [
"func",
"(",
"l",
"*",
"lbmapCache",
")",
"delBackendV2Locked",
"(",
"addrID",
"BackendAddrID",
")",
"(",
"bool",
",",
"error",
")",
"{",
"count",
",",
"found",
":=",
"l",
".",
"backendRefCount",
"[",
"addrID",
"]",
"\n",
"if",
"!",
"found",
"{",
"return",
"false",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"addrID",
")",
"\n",
"}",
"\n\n",
"if",
"count",
"==",
"1",
"{",
"delete",
"(",
"l",
".",
"backendRefCount",
",",
"addrID",
")",
"\n",
"return",
"true",
",",
"nil",
"\n",
"}",
"\n\n",
"l",
".",
"backendRefCount",
"[",
"addrID",
"]",
"--",
"\n",
"return",
"false",
",",
"nil",
"\n",
"}"
] | // delBackendV2Locked decrements a ref count for the given backend aand returns
// whether there are any instance of the backend left. | [
"delBackendV2Locked",
"decrements",
"a",
"ref",
"count",
"for",
"the",
"given",
"backend",
"aand",
"returns",
"whether",
"there",
"are",
"any",
"instance",
"of",
"the",
"backend",
"left",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/lbmap/bpfservice.go#L355-L368 |
162,330 | cilium/cilium | pkg/maps/lbmap/bpfservice.go | removeServiceV2 | func (l *lbmapCache) removeServiceV2(svcKey ServiceKeyV2) ([]loadbalancer.BackendID, int, error) {
l.mutex.Lock()
defer l.mutex.Unlock()
frontendID := svcKey.String()
bpfSvc, ok := l.entries[frontendID]
if !ok {
return nil, 0, fmt.Errorf("Service %s not found", frontendID)
}
backendsToRemove := []loadbalancer.BackendID{}
count := len(bpfSvc.backendsV2)
for addrID := range bpfSvc.backendsV2 {
isLastInstance, err := l.delBackendV2Locked(addrID)
if err != nil {
return nil, 0, err
}
if isLastInstance {
backendsToRemove = append(backendsToRemove, l.backendIDByAddrID[addrID])
delete(l.backendIDByAddrID, addrID)
}
}
// FIXME(brb) uncomment the following line after we have removed the support for
// legacy svc.
//delete(l.entries, frontendID)
return backendsToRemove, count, nil
} | go | func (l *lbmapCache) removeServiceV2(svcKey ServiceKeyV2) ([]loadbalancer.BackendID, int, error) {
l.mutex.Lock()
defer l.mutex.Unlock()
frontendID := svcKey.String()
bpfSvc, ok := l.entries[frontendID]
if !ok {
return nil, 0, fmt.Errorf("Service %s not found", frontendID)
}
backendsToRemove := []loadbalancer.BackendID{}
count := len(bpfSvc.backendsV2)
for addrID := range bpfSvc.backendsV2 {
isLastInstance, err := l.delBackendV2Locked(addrID)
if err != nil {
return nil, 0, err
}
if isLastInstance {
backendsToRemove = append(backendsToRemove, l.backendIDByAddrID[addrID])
delete(l.backendIDByAddrID, addrID)
}
}
// FIXME(brb) uncomment the following line after we have removed the support for
// legacy svc.
//delete(l.entries, frontendID)
return backendsToRemove, count, nil
} | [
"func",
"(",
"l",
"*",
"lbmapCache",
")",
"removeServiceV2",
"(",
"svcKey",
"ServiceKeyV2",
")",
"(",
"[",
"]",
"loadbalancer",
".",
"BackendID",
",",
"int",
",",
"error",
")",
"{",
"l",
".",
"mutex",
".",
"Lock",
"(",
")",
"\n",
"defer",
"l",
".",
"mutex",
".",
"Unlock",
"(",
")",
"\n\n",
"frontendID",
":=",
"svcKey",
".",
"String",
"(",
")",
"\n",
"bpfSvc",
",",
"ok",
":=",
"l",
".",
"entries",
"[",
"frontendID",
"]",
"\n",
"if",
"!",
"ok",
"{",
"return",
"nil",
",",
"0",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"frontendID",
")",
"\n",
"}",
"\n\n",
"backendsToRemove",
":=",
"[",
"]",
"loadbalancer",
".",
"BackendID",
"{",
"}",
"\n",
"count",
":=",
"len",
"(",
"bpfSvc",
".",
"backendsV2",
")",
"\n\n",
"for",
"addrID",
":=",
"range",
"bpfSvc",
".",
"backendsV2",
"{",
"isLastInstance",
",",
"err",
":=",
"l",
".",
"delBackendV2Locked",
"(",
"addrID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"0",
",",
"err",
"\n",
"}",
"\n",
"if",
"isLastInstance",
"{",
"backendsToRemove",
"=",
"append",
"(",
"backendsToRemove",
",",
"l",
".",
"backendIDByAddrID",
"[",
"addrID",
"]",
")",
"\n",
"delete",
"(",
"l",
".",
"backendIDByAddrID",
",",
"addrID",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"// FIXME(brb) uncomment the following line after we have removed the support for",
"// legacy svc.",
"//delete(l.entries, frontendID)",
"return",
"backendsToRemove",
",",
"count",
",",
"nil",
"\n",
"}"
] | // removeServiceV2 removes the service v2 from the cache. | [
"removeServiceV2",
"removes",
"the",
"service",
"v2",
"from",
"the",
"cache",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/lbmap/bpfservice.go#L404-L433 |
162,331 | cilium/cilium | pkg/maps/lbmap/bpfservice.go | removeBackendsWithRefCountZero | func (l *lbmapCache) removeBackendsWithRefCountZero() map[BackendAddrID]loadbalancer.BackendID {
l.mutex.Lock()
defer l.mutex.Unlock()
removed := make(map[BackendAddrID]loadbalancer.BackendID)
for addrID, id := range l.backendIDByAddrID {
if l.backendRefCount[addrID] == 0 {
delete(l.backendIDByAddrID, addrID)
removed[addrID] = id
}
}
return removed
} | go | func (l *lbmapCache) removeBackendsWithRefCountZero() map[BackendAddrID]loadbalancer.BackendID {
l.mutex.Lock()
defer l.mutex.Unlock()
removed := make(map[BackendAddrID]loadbalancer.BackendID)
for addrID, id := range l.backendIDByAddrID {
if l.backendRefCount[addrID] == 0 {
delete(l.backendIDByAddrID, addrID)
removed[addrID] = id
}
}
return removed
} | [
"func",
"(",
"l",
"*",
"lbmapCache",
")",
"removeBackendsWithRefCountZero",
"(",
")",
"map",
"[",
"BackendAddrID",
"]",
"loadbalancer",
".",
"BackendID",
"{",
"l",
".",
"mutex",
".",
"Lock",
"(",
")",
"\n",
"defer",
"l",
".",
"mutex",
".",
"Unlock",
"(",
")",
"\n\n",
"removed",
":=",
"make",
"(",
"map",
"[",
"BackendAddrID",
"]",
"loadbalancer",
".",
"BackendID",
")",
"\n\n",
"for",
"addrID",
",",
"id",
":=",
"range",
"l",
".",
"backendIDByAddrID",
"{",
"if",
"l",
".",
"backendRefCount",
"[",
"addrID",
"]",
"==",
"0",
"{",
"delete",
"(",
"l",
".",
"backendIDByAddrID",
",",
"addrID",
")",
"\n",
"removed",
"[",
"addrID",
"]",
"=",
"id",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"removed",
"\n",
"}"
] | // removeBackendsWithRefCountZero removes backends from the cache which are not
// used by any service. | [
"removeBackendsWithRefCountZero",
"removes",
"backends",
"from",
"the",
"cache",
"which",
"are",
"not",
"used",
"by",
"any",
"service",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/lbmap/bpfservice.go#L437-L451 |
162,332 | cilium/cilium | api/v1/server/restapi/policy/get_fqdn_cache_id_parameters.go | bindCidr | func (o *GetFqdnCacheIDParams) bindCidr(rawData []string, hasKey bool, formats strfmt.Registry) error {
var raw string
if len(rawData) > 0 {
raw = rawData[len(rawData)-1]
}
// Required: false
// AllowEmptyValue: false
if raw == "" { // empty values pass all other validations
return nil
}
o.Cidr = &raw
return nil
} | go | func (o *GetFqdnCacheIDParams) bindCidr(rawData []string, hasKey bool, formats strfmt.Registry) error {
var raw string
if len(rawData) > 0 {
raw = rawData[len(rawData)-1]
}
// Required: false
// AllowEmptyValue: false
if raw == "" { // empty values pass all other validations
return nil
}
o.Cidr = &raw
return nil
} | [
"func",
"(",
"o",
"*",
"GetFqdnCacheIDParams",
")",
"bindCidr",
"(",
"rawData",
"[",
"]",
"string",
",",
"hasKey",
"bool",
",",
"formats",
"strfmt",
".",
"Registry",
")",
"error",
"{",
"var",
"raw",
"string",
"\n",
"if",
"len",
"(",
"rawData",
")",
">",
"0",
"{",
"raw",
"=",
"rawData",
"[",
"len",
"(",
"rawData",
")",
"-",
"1",
"]",
"\n",
"}",
"\n\n",
"// Required: false",
"// AllowEmptyValue: false",
"if",
"raw",
"==",
"\"",
"\"",
"{",
"// empty values pass all other validations",
"return",
"nil",
"\n",
"}",
"\n\n",
"o",
".",
"Cidr",
"=",
"&",
"raw",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // bindCidr binds and validates parameter Cidr from query. | [
"bindCidr",
"binds",
"and",
"validates",
"parameter",
"Cidr",
"from",
"query",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/server/restapi/policy/get_fqdn_cache_id_parameters.go#L94-L109 |
162,333 | cilium/cilium | pkg/envoy/accesslog_server.go | StartAccessLogServer | func StartAccessLogServer(stateDir string, xdsServer *XDSServer, endpointInfoRegistry logger.EndpointInfoRegistry) {
accessLogPath := getAccessLogPath(stateDir)
// Create the access log listener
os.Remove(accessLogPath) // Remove/Unlink the old unix domain socket, if any.
accessLogListener, err := net.ListenUnix("unixpacket", &net.UnixAddr{Name: accessLogPath, Net: "unixpacket"})
if err != nil {
log.WithError(err).Fatalf("Envoy: Failed to open access log listen socket at %s", accessLogPath)
}
accessLogListener.SetUnlinkOnClose(true)
// Make the socket accessible by non-root Envoy proxies, e.g. running in
// sidecar containers.
if err = os.Chmod(accessLogPath, 0777); err != nil {
log.WithError(err).Fatalf("Envoy: Failed to change mode of access log listen socket at %s", accessLogPath)
}
server := accessLogServer{
xdsServer: xdsServer,
endpointInfoRegistry: endpointInfoRegistry,
}
go func() {
for {
// Each Envoy listener opens a new connection over the Unix domain socket.
// Multiple worker threads serving the listener share that same connection
uc, err := accessLogListener.AcceptUnix()
if err != nil {
// These errors are expected when we are closing down
if strings.Contains(err.Error(), "closed network connection") ||
strings.Contains(err.Error(), "invalid argument") {
break
}
log.WithError(err).Warn("Envoy: Failed to accept access log connection")
continue
}
log.Info("Envoy: Accepted access log connection")
// Serve this access log socket in a goroutine, so we can serve multiple
// connections concurrently.
go server.accessLogger(uc)
}
}()
} | go | func StartAccessLogServer(stateDir string, xdsServer *XDSServer, endpointInfoRegistry logger.EndpointInfoRegistry) {
accessLogPath := getAccessLogPath(stateDir)
// Create the access log listener
os.Remove(accessLogPath) // Remove/Unlink the old unix domain socket, if any.
accessLogListener, err := net.ListenUnix("unixpacket", &net.UnixAddr{Name: accessLogPath, Net: "unixpacket"})
if err != nil {
log.WithError(err).Fatalf("Envoy: Failed to open access log listen socket at %s", accessLogPath)
}
accessLogListener.SetUnlinkOnClose(true)
// Make the socket accessible by non-root Envoy proxies, e.g. running in
// sidecar containers.
if err = os.Chmod(accessLogPath, 0777); err != nil {
log.WithError(err).Fatalf("Envoy: Failed to change mode of access log listen socket at %s", accessLogPath)
}
server := accessLogServer{
xdsServer: xdsServer,
endpointInfoRegistry: endpointInfoRegistry,
}
go func() {
for {
// Each Envoy listener opens a new connection over the Unix domain socket.
// Multiple worker threads serving the listener share that same connection
uc, err := accessLogListener.AcceptUnix()
if err != nil {
// These errors are expected when we are closing down
if strings.Contains(err.Error(), "closed network connection") ||
strings.Contains(err.Error(), "invalid argument") {
break
}
log.WithError(err).Warn("Envoy: Failed to accept access log connection")
continue
}
log.Info("Envoy: Accepted access log connection")
// Serve this access log socket in a goroutine, so we can serve multiple
// connections concurrently.
go server.accessLogger(uc)
}
}()
} | [
"func",
"StartAccessLogServer",
"(",
"stateDir",
"string",
",",
"xdsServer",
"*",
"XDSServer",
",",
"endpointInfoRegistry",
"logger",
".",
"EndpointInfoRegistry",
")",
"{",
"accessLogPath",
":=",
"getAccessLogPath",
"(",
"stateDir",
")",
"\n\n",
"// Create the access log listener",
"os",
".",
"Remove",
"(",
"accessLogPath",
")",
"// Remove/Unlink the old unix domain socket, if any.",
"\n",
"accessLogListener",
",",
"err",
":=",
"net",
".",
"ListenUnix",
"(",
"\"",
"\"",
",",
"&",
"net",
".",
"UnixAddr",
"{",
"Name",
":",
"accessLogPath",
",",
"Net",
":",
"\"",
"\"",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"WithError",
"(",
"err",
")",
".",
"Fatalf",
"(",
"\"",
"\"",
",",
"accessLogPath",
")",
"\n",
"}",
"\n",
"accessLogListener",
".",
"SetUnlinkOnClose",
"(",
"true",
")",
"\n\n",
"// Make the socket accessible by non-root Envoy proxies, e.g. running in",
"// sidecar containers.",
"if",
"err",
"=",
"os",
".",
"Chmod",
"(",
"accessLogPath",
",",
"0777",
")",
";",
"err",
"!=",
"nil",
"{",
"log",
".",
"WithError",
"(",
"err",
")",
".",
"Fatalf",
"(",
"\"",
"\"",
",",
"accessLogPath",
")",
"\n",
"}",
"\n\n",
"server",
":=",
"accessLogServer",
"{",
"xdsServer",
":",
"xdsServer",
",",
"endpointInfoRegistry",
":",
"endpointInfoRegistry",
",",
"}",
"\n\n",
"go",
"func",
"(",
")",
"{",
"for",
"{",
"// Each Envoy listener opens a new connection over the Unix domain socket.",
"// Multiple worker threads serving the listener share that same connection",
"uc",
",",
"err",
":=",
"accessLogListener",
".",
"AcceptUnix",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"// These errors are expected when we are closing down",
"if",
"strings",
".",
"Contains",
"(",
"err",
".",
"Error",
"(",
")",
",",
"\"",
"\"",
")",
"||",
"strings",
".",
"Contains",
"(",
"err",
".",
"Error",
"(",
")",
",",
"\"",
"\"",
")",
"{",
"break",
"\n",
"}",
"\n",
"log",
".",
"WithError",
"(",
"err",
")",
".",
"Warn",
"(",
"\"",
"\"",
")",
"\n",
"continue",
"\n",
"}",
"\n",
"log",
".",
"Info",
"(",
"\"",
"\"",
")",
"\n\n",
"// Serve this access log socket in a goroutine, so we can serve multiple",
"// connections concurrently.",
"go",
"server",
".",
"accessLogger",
"(",
"uc",
")",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n",
"}"
] | // StartAccessLogServer starts the access log server. | [
"StartAccessLogServer",
"starts",
"the",
"access",
"log",
"server",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/envoy/accesslog_server.go#L45-L88 |
162,334 | cilium/cilium | pkg/bpf/stats_linux.go | Duration | func (d *DumpStats) Duration() time.Duration {
return d.Finished.Sub(d.Started)
} | go | func (d *DumpStats) Duration() time.Duration {
return d.Finished.Sub(d.Started)
} | [
"func",
"(",
"d",
"*",
"DumpStats",
")",
"Duration",
"(",
")",
"time",
".",
"Duration",
"{",
"return",
"d",
".",
"Finished",
".",
"Sub",
"(",
"d",
".",
"Started",
")",
"\n",
"}"
] | // Duration returns the duration of the dump. | [
"Duration",
"returns",
"the",
"duration",
"of",
"the",
"dump",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/bpf/stats_linux.go#L74-L76 |
162,335 | cilium/cilium | pkg/policy/api/selector.go | LabelSelectorString | func (n *EndpointSelector) LabelSelectorString() string {
if n != nil && n.LabelSelector == nil {
return "<all>"
}
return metav1.FormatLabelSelector(n.LabelSelector)
} | go | func (n *EndpointSelector) LabelSelectorString() string {
if n != nil && n.LabelSelector == nil {
return "<all>"
}
return metav1.FormatLabelSelector(n.LabelSelector)
} | [
"func",
"(",
"n",
"*",
"EndpointSelector",
")",
"LabelSelectorString",
"(",
")",
"string",
"{",
"if",
"n",
"!=",
"nil",
"&&",
"n",
".",
"LabelSelector",
"==",
"nil",
"{",
"return",
"\"",
"\"",
"\n",
"}",
"\n",
"return",
"metav1",
".",
"FormatLabelSelector",
"(",
"n",
".",
"LabelSelector",
")",
"\n",
"}"
] | // LabelSelectorString returns a user-friendly string representation of
// EndpointSelector. | [
"LabelSelectorString",
"returns",
"a",
"user",
"-",
"friendly",
"string",
"representation",
"of",
"EndpointSelector",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/selector.go#L46-L51 |
162,336 | cilium/cilium | pkg/policy/api/selector.go | String | func (n EndpointSelector) String() string {
j, _ := n.MarshalJSON()
return string(j)
} | go | func (n EndpointSelector) String() string {
j, _ := n.MarshalJSON()
return string(j)
} | [
"func",
"(",
"n",
"EndpointSelector",
")",
"String",
"(",
")",
"string",
"{",
"j",
",",
"_",
":=",
"n",
".",
"MarshalJSON",
"(",
")",
"\n",
"return",
"string",
"(",
"j",
")",
"\n",
"}"
] | // String returns a string representation of EndpointSelector. | [
"String",
"returns",
"a",
"string",
"representation",
"of",
"EndpointSelector",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/selector.go#L54-L57 |
162,337 | cilium/cilium | pkg/policy/api/selector.go | UnmarshalJSON | func (n *EndpointSelector) UnmarshalJSON(b []byte) error {
n.LabelSelector = &metav1.LabelSelector{}
err := json.Unmarshal(b, n.LabelSelector)
if err != nil {
return err
}
if n.MatchLabels != nil {
ml := map[string]string{}
for k, v := range n.MatchLabels {
ml[labels.GetExtendedKeyFrom(k)] = v
}
n.MatchLabels = ml
}
if n.MatchExpressions != nil {
newMatchExpr := make([]metav1.LabelSelectorRequirement, len(n.MatchExpressions))
for i, v := range n.MatchExpressions {
v.Key = labels.GetExtendedKeyFrom(v.Key)
newMatchExpr[i] = v
}
n.MatchExpressions = newMatchExpr
}
n.requirements = labelSelectorToRequirements(n.LabelSelector)
return nil
} | go | func (n *EndpointSelector) UnmarshalJSON(b []byte) error {
n.LabelSelector = &metav1.LabelSelector{}
err := json.Unmarshal(b, n.LabelSelector)
if err != nil {
return err
}
if n.MatchLabels != nil {
ml := map[string]string{}
for k, v := range n.MatchLabels {
ml[labels.GetExtendedKeyFrom(k)] = v
}
n.MatchLabels = ml
}
if n.MatchExpressions != nil {
newMatchExpr := make([]metav1.LabelSelectorRequirement, len(n.MatchExpressions))
for i, v := range n.MatchExpressions {
v.Key = labels.GetExtendedKeyFrom(v.Key)
newMatchExpr[i] = v
}
n.MatchExpressions = newMatchExpr
}
n.requirements = labelSelectorToRequirements(n.LabelSelector)
return nil
} | [
"func",
"(",
"n",
"*",
"EndpointSelector",
")",
"UnmarshalJSON",
"(",
"b",
"[",
"]",
"byte",
")",
"error",
"{",
"n",
".",
"LabelSelector",
"=",
"&",
"metav1",
".",
"LabelSelector",
"{",
"}",
"\n",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"b",
",",
"n",
".",
"LabelSelector",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"if",
"n",
".",
"MatchLabels",
"!=",
"nil",
"{",
"ml",
":=",
"map",
"[",
"string",
"]",
"string",
"{",
"}",
"\n",
"for",
"k",
",",
"v",
":=",
"range",
"n",
".",
"MatchLabels",
"{",
"ml",
"[",
"labels",
".",
"GetExtendedKeyFrom",
"(",
"k",
")",
"]",
"=",
"v",
"\n",
"}",
"\n",
"n",
".",
"MatchLabels",
"=",
"ml",
"\n",
"}",
"\n",
"if",
"n",
".",
"MatchExpressions",
"!=",
"nil",
"{",
"newMatchExpr",
":=",
"make",
"(",
"[",
"]",
"metav1",
".",
"LabelSelectorRequirement",
",",
"len",
"(",
"n",
".",
"MatchExpressions",
")",
")",
"\n",
"for",
"i",
",",
"v",
":=",
"range",
"n",
".",
"MatchExpressions",
"{",
"v",
".",
"Key",
"=",
"labels",
".",
"GetExtendedKeyFrom",
"(",
"v",
".",
"Key",
")",
"\n",
"newMatchExpr",
"[",
"i",
"]",
"=",
"v",
"\n",
"}",
"\n",
"n",
".",
"MatchExpressions",
"=",
"newMatchExpr",
"\n",
"}",
"\n",
"n",
".",
"requirements",
"=",
"labelSelectorToRequirements",
"(",
"n",
".",
"LabelSelector",
")",
"\n",
"return",
"nil",
"\n",
"}"
] | // UnmarshalJSON unmarshals the endpoint selector from the byte array. | [
"UnmarshalJSON",
"unmarshals",
"the",
"endpoint",
"selector",
"from",
"the",
"byte",
"array",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/selector.go#L60-L83 |
162,338 | cilium/cilium | pkg/policy/api/selector.go | MarshalJSON | func (n EndpointSelector) MarshalJSON() ([]byte, error) {
ls := metav1.LabelSelector{}
if n.LabelSelector == nil {
return json.Marshal(ls)
}
if n.MatchLabels != nil {
newLabels := map[string]string{}
for k, v := range n.MatchLabels {
newLabels[labels.GetCiliumKeyFrom(k)] = v
}
ls.MatchLabels = newLabels
}
if n.MatchExpressions != nil {
newMatchExpr := make([]metav1.LabelSelectorRequirement, len(n.MatchExpressions))
for i, v := range n.MatchExpressions {
v.Key = labels.GetCiliumKeyFrom(v.Key)
newMatchExpr[i] = v
}
ls.MatchExpressions = newMatchExpr
}
return json.Marshal(ls)
} | go | func (n EndpointSelector) MarshalJSON() ([]byte, error) {
ls := metav1.LabelSelector{}
if n.LabelSelector == nil {
return json.Marshal(ls)
}
if n.MatchLabels != nil {
newLabels := map[string]string{}
for k, v := range n.MatchLabels {
newLabels[labels.GetCiliumKeyFrom(k)] = v
}
ls.MatchLabels = newLabels
}
if n.MatchExpressions != nil {
newMatchExpr := make([]metav1.LabelSelectorRequirement, len(n.MatchExpressions))
for i, v := range n.MatchExpressions {
v.Key = labels.GetCiliumKeyFrom(v.Key)
newMatchExpr[i] = v
}
ls.MatchExpressions = newMatchExpr
}
return json.Marshal(ls)
} | [
"func",
"(",
"n",
"EndpointSelector",
")",
"MarshalJSON",
"(",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"ls",
":=",
"metav1",
".",
"LabelSelector",
"{",
"}",
"\n\n",
"if",
"n",
".",
"LabelSelector",
"==",
"nil",
"{",
"return",
"json",
".",
"Marshal",
"(",
"ls",
")",
"\n",
"}",
"\n\n",
"if",
"n",
".",
"MatchLabels",
"!=",
"nil",
"{",
"newLabels",
":=",
"map",
"[",
"string",
"]",
"string",
"{",
"}",
"\n",
"for",
"k",
",",
"v",
":=",
"range",
"n",
".",
"MatchLabels",
"{",
"newLabels",
"[",
"labels",
".",
"GetCiliumKeyFrom",
"(",
"k",
")",
"]",
"=",
"v",
"\n",
"}",
"\n",
"ls",
".",
"MatchLabels",
"=",
"newLabels",
"\n",
"}",
"\n",
"if",
"n",
".",
"MatchExpressions",
"!=",
"nil",
"{",
"newMatchExpr",
":=",
"make",
"(",
"[",
"]",
"metav1",
".",
"LabelSelectorRequirement",
",",
"len",
"(",
"n",
".",
"MatchExpressions",
")",
")",
"\n",
"for",
"i",
",",
"v",
":=",
"range",
"n",
".",
"MatchExpressions",
"{",
"v",
".",
"Key",
"=",
"labels",
".",
"GetCiliumKeyFrom",
"(",
"v",
".",
"Key",
")",
"\n",
"newMatchExpr",
"[",
"i",
"]",
"=",
"v",
"\n",
"}",
"\n",
"ls",
".",
"MatchExpressions",
"=",
"newMatchExpr",
"\n",
"}",
"\n",
"return",
"json",
".",
"Marshal",
"(",
"ls",
")",
"\n",
"}"
] | // MarshalJSON returns a JSON representation of the byte array. | [
"MarshalJSON",
"returns",
"a",
"JSON",
"representation",
"of",
"the",
"byte",
"array",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/selector.go#L86-L109 |
162,339 | cilium/cilium | pkg/policy/api/selector.go | HasKeyPrefix | func (n EndpointSelector) HasKeyPrefix(prefix string) bool {
for k := range n.MatchLabels {
if strings.HasPrefix(k, prefix) {
return true
}
}
for _, v := range n.MatchExpressions {
if strings.HasPrefix(v.Key, prefix) {
return true
}
}
return false
} | go | func (n EndpointSelector) HasKeyPrefix(prefix string) bool {
for k := range n.MatchLabels {
if strings.HasPrefix(k, prefix) {
return true
}
}
for _, v := range n.MatchExpressions {
if strings.HasPrefix(v.Key, prefix) {
return true
}
}
return false
} | [
"func",
"(",
"n",
"EndpointSelector",
")",
"HasKeyPrefix",
"(",
"prefix",
"string",
")",
"bool",
"{",
"for",
"k",
":=",
"range",
"n",
".",
"MatchLabels",
"{",
"if",
"strings",
".",
"HasPrefix",
"(",
"k",
",",
"prefix",
")",
"{",
"return",
"true",
"\n",
"}",
"\n",
"}",
"\n",
"for",
"_",
",",
"v",
":=",
"range",
"n",
".",
"MatchExpressions",
"{",
"if",
"strings",
".",
"HasPrefix",
"(",
"v",
".",
"Key",
",",
"prefix",
")",
"{",
"return",
"true",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"false",
"\n",
"}"
] | // HasKeyPrefix checks if the endpoint selector contains the given key prefix in
// its MatchLabels map and MatchExpressions slice. | [
"HasKeyPrefix",
"checks",
"if",
"the",
"endpoint",
"selector",
"contains",
"the",
"given",
"key",
"prefix",
"in",
"its",
"MatchLabels",
"map",
"and",
"MatchExpressions",
"slice",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/selector.go#L113-L125 |
162,340 | cilium/cilium | pkg/policy/api/selector.go | HasKey | func (n EndpointSelector) HasKey(key string) bool {
if _, ok := n.MatchLabels[key]; ok {
return true
}
for _, v := range n.MatchExpressions {
if v.Key == key {
return true
}
}
return false
} | go | func (n EndpointSelector) HasKey(key string) bool {
if _, ok := n.MatchLabels[key]; ok {
return true
}
for _, v := range n.MatchExpressions {
if v.Key == key {
return true
}
}
return false
} | [
"func",
"(",
"n",
"EndpointSelector",
")",
"HasKey",
"(",
"key",
"string",
")",
"bool",
"{",
"if",
"_",
",",
"ok",
":=",
"n",
".",
"MatchLabels",
"[",
"key",
"]",
";",
"ok",
"{",
"return",
"true",
"\n",
"}",
"\n",
"for",
"_",
",",
"v",
":=",
"range",
"n",
".",
"MatchExpressions",
"{",
"if",
"v",
".",
"Key",
"==",
"key",
"{",
"return",
"true",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"false",
"\n",
"}"
] | // HasKey checks if the endpoint selector contains the given key in
// its MatchLabels map or in its MatchExpressions slice. | [
"HasKey",
"checks",
"if",
"the",
"endpoint",
"selector",
"contains",
"the",
"given",
"key",
"in",
"its",
"MatchLabels",
"map",
"or",
"in",
"its",
"MatchExpressions",
"slice",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/selector.go#L129-L139 |
162,341 | cilium/cilium | pkg/policy/api/selector.go | GetMatch | func (n EndpointSelector) GetMatch(key string) ([]string, bool) {
if value, ok := n.MatchLabels[key]; ok {
return []string{value}, true
}
for _, v := range n.MatchExpressions {
if v.Key == key && v.Operator == metav1.LabelSelectorOpIn {
return v.Values, true
}
}
return nil, false
} | go | func (n EndpointSelector) GetMatch(key string) ([]string, bool) {
if value, ok := n.MatchLabels[key]; ok {
return []string{value}, true
}
for _, v := range n.MatchExpressions {
if v.Key == key && v.Operator == metav1.LabelSelectorOpIn {
return v.Values, true
}
}
return nil, false
} | [
"func",
"(",
"n",
"EndpointSelector",
")",
"GetMatch",
"(",
"key",
"string",
")",
"(",
"[",
"]",
"string",
",",
"bool",
")",
"{",
"if",
"value",
",",
"ok",
":=",
"n",
".",
"MatchLabels",
"[",
"key",
"]",
";",
"ok",
"{",
"return",
"[",
"]",
"string",
"{",
"value",
"}",
",",
"true",
"\n",
"}",
"\n",
"for",
"_",
",",
"v",
":=",
"range",
"n",
".",
"MatchExpressions",
"{",
"if",
"v",
".",
"Key",
"==",
"key",
"&&",
"v",
".",
"Operator",
"==",
"metav1",
".",
"LabelSelectorOpIn",
"{",
"return",
"v",
".",
"Values",
",",
"true",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
",",
"false",
"\n",
"}"
] | // GetMatch checks for a match on the specified key, and returns the value that
// the key must match, and true. If a match cannot be found, returns nil, false. | [
"GetMatch",
"checks",
"for",
"a",
"match",
"on",
"the",
"specified",
"key",
"and",
"returns",
"the",
"value",
"that",
"the",
"key",
"must",
"match",
"and",
"true",
".",
"If",
"a",
"match",
"cannot",
"be",
"found",
"returns",
"nil",
"false",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/selector.go#L143-L153 |
162,342 | cilium/cilium | pkg/policy/api/selector.go | NewESFromLabels | func NewESFromLabels(lbls ...labels.Label) EndpointSelector {
ml := map[string]string{}
for _, lbl := range lbls {
ml[lbl.GetExtendedKey()] = lbl.Value
}
return NewESFromMatchRequirements(ml, nil)
} | go | func NewESFromLabels(lbls ...labels.Label) EndpointSelector {
ml := map[string]string{}
for _, lbl := range lbls {
ml[lbl.GetExtendedKey()] = lbl.Value
}
return NewESFromMatchRequirements(ml, nil)
} | [
"func",
"NewESFromLabels",
"(",
"lbls",
"...",
"labels",
".",
"Label",
")",
"EndpointSelector",
"{",
"ml",
":=",
"map",
"[",
"string",
"]",
"string",
"{",
"}",
"\n",
"for",
"_",
",",
"lbl",
":=",
"range",
"lbls",
"{",
"ml",
"[",
"lbl",
".",
"GetExtendedKey",
"(",
")",
"]",
"=",
"lbl",
".",
"Value",
"\n",
"}",
"\n\n",
"return",
"NewESFromMatchRequirements",
"(",
"ml",
",",
"nil",
")",
"\n",
"}"
] | // NewESFromLabels creates a new endpoint selector from the given labels. | [
"NewESFromLabels",
"creates",
"a",
"new",
"endpoint",
"selector",
"from",
"the",
"given",
"labels",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/selector.go#L179-L186 |
162,343 | cilium/cilium | pkg/policy/api/selector.go | newReservedEndpointSelector | func newReservedEndpointSelector(ID string) EndpointSelector {
reservedLabels := labels.NewLabel(ID, "", labels.LabelSourceReserved)
return NewESFromLabels(reservedLabels)
} | go | func newReservedEndpointSelector(ID string) EndpointSelector {
reservedLabels := labels.NewLabel(ID, "", labels.LabelSourceReserved)
return NewESFromLabels(reservedLabels)
} | [
"func",
"newReservedEndpointSelector",
"(",
"ID",
"string",
")",
"EndpointSelector",
"{",
"reservedLabels",
":=",
"labels",
".",
"NewLabel",
"(",
"ID",
",",
"\"",
"\"",
",",
"labels",
".",
"LabelSourceReserved",
")",
"\n",
"return",
"NewESFromLabels",
"(",
"reservedLabels",
")",
"\n",
"}"
] | // newReservedEndpointSelector returns a selector that matches on all
// endpoints with the specified reserved label. | [
"newReservedEndpointSelector",
"returns",
"a",
"selector",
"that",
"matches",
"on",
"all",
"endpoints",
"with",
"the",
"specified",
"reserved",
"label",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/selector.go#L216-L219 |
162,344 | cilium/cilium | pkg/policy/api/selector.go | NewESFromK8sLabelSelector | func NewESFromK8sLabelSelector(srcPrefix string, lss ...*metav1.LabelSelector) EndpointSelector {
var (
matchLabels map[string]string
matchExpressions []metav1.LabelSelectorRequirement
)
for _, ls := range lss {
if ls == nil {
continue
}
if ls.MatchLabels != nil {
if matchLabels == nil {
matchLabels = map[string]string{}
}
for k, v := range ls.MatchLabels {
matchLabels[srcPrefix+k] = v
}
}
if ls.MatchExpressions != nil {
if matchExpressions == nil {
matchExpressions = make([]metav1.LabelSelectorRequirement, 0, len(ls.MatchExpressions))
}
for _, v := range ls.MatchExpressions {
v.Key = srcPrefix + v.Key
matchExpressions = append(matchExpressions, v)
}
}
}
return NewESFromMatchRequirements(matchLabels, matchExpressions)
} | go | func NewESFromK8sLabelSelector(srcPrefix string, lss ...*metav1.LabelSelector) EndpointSelector {
var (
matchLabels map[string]string
matchExpressions []metav1.LabelSelectorRequirement
)
for _, ls := range lss {
if ls == nil {
continue
}
if ls.MatchLabels != nil {
if matchLabels == nil {
matchLabels = map[string]string{}
}
for k, v := range ls.MatchLabels {
matchLabels[srcPrefix+k] = v
}
}
if ls.MatchExpressions != nil {
if matchExpressions == nil {
matchExpressions = make([]metav1.LabelSelectorRequirement, 0, len(ls.MatchExpressions))
}
for _, v := range ls.MatchExpressions {
v.Key = srcPrefix + v.Key
matchExpressions = append(matchExpressions, v)
}
}
}
return NewESFromMatchRequirements(matchLabels, matchExpressions)
} | [
"func",
"NewESFromK8sLabelSelector",
"(",
"srcPrefix",
"string",
",",
"lss",
"...",
"*",
"metav1",
".",
"LabelSelector",
")",
"EndpointSelector",
"{",
"var",
"(",
"matchLabels",
"map",
"[",
"string",
"]",
"string",
"\n",
"matchExpressions",
"[",
"]",
"metav1",
".",
"LabelSelectorRequirement",
"\n",
")",
"\n",
"for",
"_",
",",
"ls",
":=",
"range",
"lss",
"{",
"if",
"ls",
"==",
"nil",
"{",
"continue",
"\n",
"}",
"\n",
"if",
"ls",
".",
"MatchLabels",
"!=",
"nil",
"{",
"if",
"matchLabels",
"==",
"nil",
"{",
"matchLabels",
"=",
"map",
"[",
"string",
"]",
"string",
"{",
"}",
"\n",
"}",
"\n",
"for",
"k",
",",
"v",
":=",
"range",
"ls",
".",
"MatchLabels",
"{",
"matchLabels",
"[",
"srcPrefix",
"+",
"k",
"]",
"=",
"v",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"ls",
".",
"MatchExpressions",
"!=",
"nil",
"{",
"if",
"matchExpressions",
"==",
"nil",
"{",
"matchExpressions",
"=",
"make",
"(",
"[",
"]",
"metav1",
".",
"LabelSelectorRequirement",
",",
"0",
",",
"len",
"(",
"ls",
".",
"MatchExpressions",
")",
")",
"\n",
"}",
"\n",
"for",
"_",
",",
"v",
":=",
"range",
"ls",
".",
"MatchExpressions",
"{",
"v",
".",
"Key",
"=",
"srcPrefix",
"+",
"v",
".",
"Key",
"\n",
"matchExpressions",
"=",
"append",
"(",
"matchExpressions",
",",
"v",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"NewESFromMatchRequirements",
"(",
"matchLabels",
",",
"matchExpressions",
")",
"\n",
"}"
] | // NewESFromK8sLabelSelector returns a new endpoint selector from the label
// where it the given srcPrefix will be encoded in the label's keys. | [
"NewESFromK8sLabelSelector",
"returns",
"a",
"new",
"endpoint",
"selector",
"from",
"the",
"label",
"where",
"it",
"the",
"given",
"srcPrefix",
"will",
"be",
"encoded",
"in",
"the",
"label",
"s",
"keys",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/selector.go#L236-L264 |
162,345 | cilium/cilium | pkg/policy/api/selector.go | AddMatch | func (n *EndpointSelector) AddMatch(key, value string) {
if n.MatchLabels == nil {
n.MatchLabels = map[string]string{}
}
n.MatchLabels[key] = value
n.requirements = labelSelectorToRequirements(n.LabelSelector)
} | go | func (n *EndpointSelector) AddMatch(key, value string) {
if n.MatchLabels == nil {
n.MatchLabels = map[string]string{}
}
n.MatchLabels[key] = value
n.requirements = labelSelectorToRequirements(n.LabelSelector)
} | [
"func",
"(",
"n",
"*",
"EndpointSelector",
")",
"AddMatch",
"(",
"key",
",",
"value",
"string",
")",
"{",
"if",
"n",
".",
"MatchLabels",
"==",
"nil",
"{",
"n",
".",
"MatchLabels",
"=",
"map",
"[",
"string",
"]",
"string",
"{",
"}",
"\n",
"}",
"\n",
"n",
".",
"MatchLabels",
"[",
"key",
"]",
"=",
"value",
"\n",
"n",
".",
"requirements",
"=",
"labelSelectorToRequirements",
"(",
"n",
".",
"LabelSelector",
")",
"\n",
"}"
] | // AddMatch adds a match for 'key' == 'value' to the endpoint selector. | [
"AddMatch",
"adds",
"a",
"match",
"for",
"key",
"==",
"value",
"to",
"the",
"endpoint",
"selector",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/selector.go#L267-L273 |
162,346 | cilium/cilium | pkg/policy/api/selector.go | Matches | func (n *EndpointSelector) Matches(lblsToMatch k8sLbls.Labels) bool {
// Try to update cached requirements for this EndpointSelector if possible.
if n.requirements == nil {
n.requirements = labelSelectorToRequirements(n.LabelSelector)
// Nil indicates that requirements failed validation in some way,
// so we cannot parse the labels for matching purposes; thus, we cannot
// match if labels cannot be parsed, so return false.
if n.requirements == nil {
return false
}
}
for k := range n.MatchLabels {
if k == labels.LabelSourceReservedKeyPrefix+labels.IDNameAll {
return true
}
}
for _, req := range *n.requirements {
if !req.Matches(lblsToMatch) {
return false
}
}
return true
} | go | func (n *EndpointSelector) Matches(lblsToMatch k8sLbls.Labels) bool {
// Try to update cached requirements for this EndpointSelector if possible.
if n.requirements == nil {
n.requirements = labelSelectorToRequirements(n.LabelSelector)
// Nil indicates that requirements failed validation in some way,
// so we cannot parse the labels for matching purposes; thus, we cannot
// match if labels cannot be parsed, so return false.
if n.requirements == nil {
return false
}
}
for k := range n.MatchLabels {
if k == labels.LabelSourceReservedKeyPrefix+labels.IDNameAll {
return true
}
}
for _, req := range *n.requirements {
if !req.Matches(lblsToMatch) {
return false
}
}
return true
} | [
"func",
"(",
"n",
"*",
"EndpointSelector",
")",
"Matches",
"(",
"lblsToMatch",
"k8sLbls",
".",
"Labels",
")",
"bool",
"{",
"// Try to update cached requirements for this EndpointSelector if possible.",
"if",
"n",
".",
"requirements",
"==",
"nil",
"{",
"n",
".",
"requirements",
"=",
"labelSelectorToRequirements",
"(",
"n",
".",
"LabelSelector",
")",
"\n",
"// Nil indicates that requirements failed validation in some way,",
"// so we cannot parse the labels for matching purposes; thus, we cannot",
"// match if labels cannot be parsed, so return false.",
"if",
"n",
".",
"requirements",
"==",
"nil",
"{",
"return",
"false",
"\n",
"}",
"\n",
"}",
"\n\n",
"for",
"k",
":=",
"range",
"n",
".",
"MatchLabels",
"{",
"if",
"k",
"==",
"labels",
".",
"LabelSourceReservedKeyPrefix",
"+",
"labels",
".",
"IDNameAll",
"{",
"return",
"true",
"\n",
"}",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"req",
":=",
"range",
"*",
"n",
".",
"requirements",
"{",
"if",
"!",
"req",
".",
"Matches",
"(",
"lblsToMatch",
")",
"{",
"return",
"false",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"true",
"\n",
"}"
] | // Matches returns true if the endpoint selector Matches the `lblsToMatch`.
// Returns always true if the endpoint selector contains the reserved label for
// "all". | [
"Matches",
"returns",
"true",
"if",
"the",
"endpoint",
"selector",
"Matches",
"the",
"lblsToMatch",
".",
"Returns",
"always",
"true",
"if",
"the",
"endpoint",
"selector",
"contains",
"the",
"reserved",
"label",
"for",
"all",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/selector.go#L278-L303 |
162,347 | cilium/cilium | pkg/policy/api/selector.go | IsWildcard | func (n *EndpointSelector) IsWildcard() bool {
return n.LabelSelector != nil &&
len(n.LabelSelector.MatchLabels)+len(n.LabelSelector.MatchExpressions) == 0
} | go | func (n *EndpointSelector) IsWildcard() bool {
return n.LabelSelector != nil &&
len(n.LabelSelector.MatchLabels)+len(n.LabelSelector.MatchExpressions) == 0
} | [
"func",
"(",
"n",
"*",
"EndpointSelector",
")",
"IsWildcard",
"(",
")",
"bool",
"{",
"return",
"n",
".",
"LabelSelector",
"!=",
"nil",
"&&",
"len",
"(",
"n",
".",
"LabelSelector",
".",
"MatchLabels",
")",
"+",
"len",
"(",
"n",
".",
"LabelSelector",
".",
"MatchExpressions",
")",
"==",
"0",
"\n",
"}"
] | // IsWildcard returns true if the endpoint selector selects all endpoints. | [
"IsWildcard",
"returns",
"true",
"if",
"the",
"endpoint",
"selector",
"selects",
"all",
"endpoints",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/selector.go#L306-L309 |
162,348 | cilium/cilium | pkg/policy/api/selector.go | ConvertToLabelSelectorRequirementSlice | func (n *EndpointSelector) ConvertToLabelSelectorRequirementSlice() []metav1.LabelSelectorRequirement {
requirements := make([]metav1.LabelSelectorRequirement, 0, len(n.MatchExpressions)+len(n.MatchLabels))
// Append already existing match expressions.
requirements = append(requirements, n.MatchExpressions...)
// Convert each MatchLables to LabelSelectorRequirement.
for key, value := range n.MatchLabels {
requirementFromMatchLabels := metav1.LabelSelectorRequirement{
Key: key,
Operator: metav1.LabelSelectorOpIn,
Values: []string{value},
}
requirements = append(requirements, requirementFromMatchLabels)
}
return requirements
} | go | func (n *EndpointSelector) ConvertToLabelSelectorRequirementSlice() []metav1.LabelSelectorRequirement {
requirements := make([]metav1.LabelSelectorRequirement, 0, len(n.MatchExpressions)+len(n.MatchLabels))
// Append already existing match expressions.
requirements = append(requirements, n.MatchExpressions...)
// Convert each MatchLables to LabelSelectorRequirement.
for key, value := range n.MatchLabels {
requirementFromMatchLabels := metav1.LabelSelectorRequirement{
Key: key,
Operator: metav1.LabelSelectorOpIn,
Values: []string{value},
}
requirements = append(requirements, requirementFromMatchLabels)
}
return requirements
} | [
"func",
"(",
"n",
"*",
"EndpointSelector",
")",
"ConvertToLabelSelectorRequirementSlice",
"(",
")",
"[",
"]",
"metav1",
".",
"LabelSelectorRequirement",
"{",
"requirements",
":=",
"make",
"(",
"[",
"]",
"metav1",
".",
"LabelSelectorRequirement",
",",
"0",
",",
"len",
"(",
"n",
".",
"MatchExpressions",
")",
"+",
"len",
"(",
"n",
".",
"MatchLabels",
")",
")",
"\n",
"// Append already existing match expressions.",
"requirements",
"=",
"append",
"(",
"requirements",
",",
"n",
".",
"MatchExpressions",
"...",
")",
"\n",
"// Convert each MatchLables to LabelSelectorRequirement.",
"for",
"key",
",",
"value",
":=",
"range",
"n",
".",
"MatchLabels",
"{",
"requirementFromMatchLabels",
":=",
"metav1",
".",
"LabelSelectorRequirement",
"{",
"Key",
":",
"key",
",",
"Operator",
":",
"metav1",
".",
"LabelSelectorOpIn",
",",
"Values",
":",
"[",
"]",
"string",
"{",
"value",
"}",
",",
"}",
"\n",
"requirements",
"=",
"append",
"(",
"requirements",
",",
"requirementFromMatchLabels",
")",
"\n",
"}",
"\n",
"return",
"requirements",
"\n",
"}"
] | // ConvertToLabelSelectorRequirementSlice converts the MatchLabels and
// MatchExpressions within the specified EndpointSelector into a list of
// LabelSelectorRequirements. | [
"ConvertToLabelSelectorRequirementSlice",
"converts",
"the",
"MatchLabels",
"and",
"MatchExpressions",
"within",
"the",
"specified",
"EndpointSelector",
"into",
"a",
"list",
"of",
"LabelSelectorRequirements",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/selector.go#L314-L328 |
162,349 | cilium/cilium | pkg/policy/api/selector.go | sanitize | func (n *EndpointSelector) sanitize() error {
errList := validation.ValidateLabelSelector(n.LabelSelector, nil)
if len(errList) > 0 {
return fmt.Errorf("invalid label selector: %s", errList.ToAggregate().Error())
}
return nil
} | go | func (n *EndpointSelector) sanitize() error {
errList := validation.ValidateLabelSelector(n.LabelSelector, nil)
if len(errList) > 0 {
return fmt.Errorf("invalid label selector: %s", errList.ToAggregate().Error())
}
return nil
} | [
"func",
"(",
"n",
"*",
"EndpointSelector",
")",
"sanitize",
"(",
")",
"error",
"{",
"errList",
":=",
"validation",
".",
"ValidateLabelSelector",
"(",
"n",
".",
"LabelSelector",
",",
"nil",
")",
"\n",
"if",
"len",
"(",
"errList",
")",
">",
"0",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"errList",
".",
"ToAggregate",
"(",
")",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // sanitize returns an error if the EndpointSelector's LabelSelector is invalid. | [
"sanitize",
"returns",
"an",
"error",
"if",
"the",
"EndpointSelector",
"s",
"LabelSelector",
"is",
"invalid",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/selector.go#L331-L337 |
162,350 | cilium/cilium | pkg/policy/api/selector.go | Matches | func (s EndpointSelectorSlice) Matches(ctx labels.LabelArray) bool {
for _, selector := range s {
if selector.Matches(ctx) {
return true
}
}
return false
} | go | func (s EndpointSelectorSlice) Matches(ctx labels.LabelArray) bool {
for _, selector := range s {
if selector.Matches(ctx) {
return true
}
}
return false
} | [
"func",
"(",
"s",
"EndpointSelectorSlice",
")",
"Matches",
"(",
"ctx",
"labels",
".",
"LabelArray",
")",
"bool",
"{",
"for",
"_",
",",
"selector",
":=",
"range",
"s",
"{",
"if",
"selector",
".",
"Matches",
"(",
"ctx",
")",
"{",
"return",
"true",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"false",
"\n",
"}"
] | // Matches returns true if any of the EndpointSelectors in the slice match the
// provided labels | [
"Matches",
"returns",
"true",
"if",
"any",
"of",
"the",
"EndpointSelectors",
"in",
"the",
"slice",
"match",
"the",
"provided",
"labels"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/selector.go#L354-L362 |
162,351 | cilium/cilium | pkg/policy/api/selector.go | SelectsAllEndpoints | func (s EndpointSelectorSlice) SelectsAllEndpoints() bool {
for _, selector := range s {
if selector.IsWildcard() {
return true
}
}
return false
} | go | func (s EndpointSelectorSlice) SelectsAllEndpoints() bool {
for _, selector := range s {
if selector.IsWildcard() {
return true
}
}
return false
} | [
"func",
"(",
"s",
"EndpointSelectorSlice",
")",
"SelectsAllEndpoints",
"(",
")",
"bool",
"{",
"for",
"_",
",",
"selector",
":=",
"range",
"s",
"{",
"if",
"selector",
".",
"IsWildcard",
"(",
")",
"{",
"return",
"true",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"false",
"\n",
"}"
] | // SelectsAllEndpoints returns whether the EndpointSelectorSlice selects all
// endpoints, which is true if the wildcard endpoint selector is present in the
// slice. | [
"SelectsAllEndpoints",
"returns",
"whether",
"the",
"EndpointSelectorSlice",
"selects",
"all",
"endpoints",
"which",
"is",
"true",
"if",
"the",
"wildcard",
"endpoint",
"selector",
"is",
"present",
"in",
"the",
"slice",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/selector.go#L367-L374 |
162,352 | cilium/cilium | api/v1/server/restapi/daemon/get_map_name.go | NewGetMapName | func NewGetMapName(ctx *middleware.Context, handler GetMapNameHandler) *GetMapName {
return &GetMapName{Context: ctx, Handler: handler}
} | go | func NewGetMapName(ctx *middleware.Context, handler GetMapNameHandler) *GetMapName {
return &GetMapName{Context: ctx, Handler: handler}
} | [
"func",
"NewGetMapName",
"(",
"ctx",
"*",
"middleware",
".",
"Context",
",",
"handler",
"GetMapNameHandler",
")",
"*",
"GetMapName",
"{",
"return",
"&",
"GetMapName",
"{",
"Context",
":",
"ctx",
",",
"Handler",
":",
"handler",
"}",
"\n",
"}"
] | // NewGetMapName creates a new http.Handler for the get map name operation | [
"NewGetMapName",
"creates",
"a",
"new",
"http",
".",
"Handler",
"for",
"the",
"get",
"map",
"name",
"operation"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/server/restapi/daemon/get_map_name.go#L28-L30 |
162,353 | cilium/cilium | pkg/completion/completion.go | NewWaitGroup | func NewWaitGroup(ctx context.Context) *WaitGroup {
ctx2, cancel := context.WithCancel(ctx)
return &WaitGroup{ctx: ctx2, cancel: cancel}
} | go | func NewWaitGroup(ctx context.Context) *WaitGroup {
ctx2, cancel := context.WithCancel(ctx)
return &WaitGroup{ctx: ctx2, cancel: cancel}
} | [
"func",
"NewWaitGroup",
"(",
"ctx",
"context",
".",
"Context",
")",
"*",
"WaitGroup",
"{",
"ctx2",
",",
"cancel",
":=",
"context",
".",
"WithCancel",
"(",
"ctx",
")",
"\n",
"return",
"&",
"WaitGroup",
"{",
"ctx",
":",
"ctx2",
",",
"cancel",
":",
"cancel",
"}",
"\n",
"}"
] | // NewWaitGroup returns a new WaitGroup using the given context. | [
"NewWaitGroup",
"returns",
"a",
"new",
"WaitGroup",
"using",
"the",
"given",
"context",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/completion/completion.go#L41-L44 |
162,354 | cilium/cilium | pkg/completion/completion.go | Wait | func (wg *WaitGroup) Wait() error {
wg.counterLocker.Lock()
defer wg.counterLocker.Unlock()
var err error
Loop:
for i, comp := range wg.pendingCompletions {
select {
case <-comp.Completed():
err = updateError(err, comp.Err()) // Keep the most severe error value we encounter
continue Loop
case <-wg.ctx.Done():
// Complete the remaining completions (if any) to make sure their completed
// channels are closed.
for _, comp := range wg.pendingCompletions[i:] {
// 'comp' may have already completed on a different error
compErr := comp.Complete(wg.ctx.Err())
err = updateError(err, compErr) // Keep the most severe error value we encounter
}
break Loop
}
}
wg.pendingCompletions = nil
return err
} | go | func (wg *WaitGroup) Wait() error {
wg.counterLocker.Lock()
defer wg.counterLocker.Unlock()
var err error
Loop:
for i, comp := range wg.pendingCompletions {
select {
case <-comp.Completed():
err = updateError(err, comp.Err()) // Keep the most severe error value we encounter
continue Loop
case <-wg.ctx.Done():
// Complete the remaining completions (if any) to make sure their completed
// channels are closed.
for _, comp := range wg.pendingCompletions[i:] {
// 'comp' may have already completed on a different error
compErr := comp.Complete(wg.ctx.Err())
err = updateError(err, compErr) // Keep the most severe error value we encounter
}
break Loop
}
}
wg.pendingCompletions = nil
return err
} | [
"func",
"(",
"wg",
"*",
"WaitGroup",
")",
"Wait",
"(",
")",
"error",
"{",
"wg",
".",
"counterLocker",
".",
"Lock",
"(",
")",
"\n",
"defer",
"wg",
".",
"counterLocker",
".",
"Unlock",
"(",
")",
"\n\n",
"var",
"err",
"error",
"\n",
"Loop",
":",
"for",
"i",
",",
"comp",
":=",
"range",
"wg",
".",
"pendingCompletions",
"{",
"select",
"{",
"case",
"<-",
"comp",
".",
"Completed",
"(",
")",
":",
"err",
"=",
"updateError",
"(",
"err",
",",
"comp",
".",
"Err",
"(",
")",
")",
"// Keep the most severe error value we encounter",
"\n",
"continue",
"Loop",
"\n",
"case",
"<-",
"wg",
".",
"ctx",
".",
"Done",
"(",
")",
":",
"// Complete the remaining completions (if any) to make sure their completed",
"// channels are closed.",
"for",
"_",
",",
"comp",
":=",
"range",
"wg",
".",
"pendingCompletions",
"[",
"i",
":",
"]",
"{",
"// 'comp' may have already completed on a different error",
"compErr",
":=",
"comp",
".",
"Complete",
"(",
"wg",
".",
"ctx",
".",
"Err",
"(",
")",
")",
"\n",
"err",
"=",
"updateError",
"(",
"err",
",",
"compErr",
")",
"// Keep the most severe error value we encounter",
"\n",
"}",
"\n",
"break",
"Loop",
"\n",
"}",
"\n",
"}",
"\n",
"wg",
".",
"pendingCompletions",
"=",
"nil",
"\n",
"return",
"err",
"\n",
"}"
] | // Wait blocks until all completions added by calling AddCompletion are
// completed, or the context is canceled, whichever happens first.
// Returns the context's error if it is cancelled, nil otherwise.
// No callbacks of the completions in this wait group will be called after
// this returns.
// Returns the error value of one of the completions, if available, or the
// error value of the Context otherwise. | [
"Wait",
"blocks",
"until",
"all",
"completions",
"added",
"by",
"calling",
"AddCompletion",
"are",
"completed",
"or",
"the",
"context",
"is",
"canceled",
"whichever",
"happens",
"first",
".",
"Returns",
"the",
"context",
"s",
"error",
"if",
"it",
"is",
"cancelled",
"nil",
"otherwise",
".",
"No",
"callbacks",
"of",
"the",
"completions",
"in",
"this",
"wait",
"group",
"will",
"be",
"called",
"after",
"this",
"returns",
".",
"Returns",
"the",
"error",
"value",
"of",
"one",
"of",
"the",
"completions",
"if",
"available",
"or",
"the",
"error",
"value",
"of",
"the",
"Context",
"otherwise",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/completion/completion.go#L97-L121 |
162,355 | cilium/cilium | pkg/completion/completion.go | Err | func (c *Completion) Err() error {
c.lock.Lock()
defer c.lock.Unlock()
return c.err
} | go | func (c *Completion) Err() error {
c.lock.Lock()
defer c.lock.Unlock()
return c.err
} | [
"func",
"(",
"c",
"*",
"Completion",
")",
"Err",
"(",
")",
"error",
"{",
"c",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"c",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n",
"return",
"c",
".",
"err",
"\n",
"}"
] | // Err returns a non-nil error if the completion ended in error | [
"Err",
"returns",
"a",
"non",
"-",
"nil",
"error",
"if",
"the",
"completion",
"ended",
"in",
"error"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/completion/completion.go#L144-L148 |
162,356 | cilium/cilium | pkg/completion/completion.go | Complete | func (c *Completion) Complete(err error) error {
c.lock.Lock()
select {
case <-c.completed:
err = c.err // return the error 'c' completed with
default:
c.err = err
if c.callback != nil {
// We must call the callbacks synchronously to guarantee
// that they are actually called before Wait() returns.
c.callback(err)
}
// Cancel the WaitGroup on failure
if err != nil && c.cancel != nil {
c.cancel()
}
close(c.completed)
}
c.lock.Unlock()
return err
} | go | func (c *Completion) Complete(err error) error {
c.lock.Lock()
select {
case <-c.completed:
err = c.err // return the error 'c' completed with
default:
c.err = err
if c.callback != nil {
// We must call the callbacks synchronously to guarantee
// that they are actually called before Wait() returns.
c.callback(err)
}
// Cancel the WaitGroup on failure
if err != nil && c.cancel != nil {
c.cancel()
}
close(c.completed)
}
c.lock.Unlock()
return err
} | [
"func",
"(",
"c",
"*",
"Completion",
")",
"Complete",
"(",
"err",
"error",
")",
"error",
"{",
"c",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"select",
"{",
"case",
"<-",
"c",
".",
"completed",
":",
"err",
"=",
"c",
".",
"err",
"// return the error 'c' completed with",
"\n",
"default",
":",
"c",
".",
"err",
"=",
"err",
"\n",
"if",
"c",
".",
"callback",
"!=",
"nil",
"{",
"// We must call the callbacks synchronously to guarantee",
"// that they are actually called before Wait() returns.",
"c",
".",
"callback",
"(",
"err",
")",
"\n",
"}",
"\n",
"// Cancel the WaitGroup on failure",
"if",
"err",
"!=",
"nil",
"&&",
"c",
".",
"cancel",
"!=",
"nil",
"{",
"c",
".",
"cancel",
"(",
")",
"\n",
"}",
"\n",
"close",
"(",
"c",
".",
"completed",
")",
"\n",
"}",
"\n",
"c",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n",
"return",
"err",
"\n",
"}"
] | // Complete notifies of the completion of the asynchronous computation.
// Idempotent.
// If the operation completed successfully 'err' is passed as nil.
// Returns the error state the completion completed with, which is
// gnerally different from 'err' if already completed. | [
"Complete",
"notifies",
"of",
"the",
"completion",
"of",
"the",
"asynchronous",
"computation",
".",
"Idempotent",
".",
"If",
"the",
"operation",
"completed",
"successfully",
"err",
"is",
"passed",
"as",
"nil",
".",
"Returns",
"the",
"error",
"state",
"the",
"completion",
"completed",
"with",
"which",
"is",
"gnerally",
"different",
"from",
"err",
"if",
"already",
"completed",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/completion/completion.go#L155-L175 |
162,357 | cilium/cilium | api/v1/server/restapi/policy/get_identity_responses.go | WithPayload | func (o *GetIdentityOK) WithPayload(payload []*models.Identity) *GetIdentityOK {
o.Payload = payload
return o
} | go | func (o *GetIdentityOK) WithPayload(payload []*models.Identity) *GetIdentityOK {
o.Payload = payload
return o
} | [
"func",
"(",
"o",
"*",
"GetIdentityOK",
")",
"WithPayload",
"(",
"payload",
"[",
"]",
"*",
"models",
".",
"Identity",
")",
"*",
"GetIdentityOK",
"{",
"o",
".",
"Payload",
"=",
"payload",
"\n",
"return",
"o",
"\n",
"}"
] | // WithPayload adds the payload to the get identity o k response | [
"WithPayload",
"adds",
"the",
"payload",
"to",
"the",
"get",
"identity",
"o",
"k",
"response"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/server/restapi/policy/get_identity_responses.go#L38-L41 |
162,358 | cilium/cilium | api/v1/server/restapi/policy/get_identity_responses.go | WithPayload | func (o *GetIdentityUnreachable) WithPayload(payload models.Error) *GetIdentityUnreachable {
o.Payload = payload
return o
} | go | func (o *GetIdentityUnreachable) WithPayload(payload models.Error) *GetIdentityUnreachable {
o.Payload = payload
return o
} | [
"func",
"(",
"o",
"*",
"GetIdentityUnreachable",
")",
"WithPayload",
"(",
"payload",
"models",
".",
"Error",
")",
"*",
"GetIdentityUnreachable",
"{",
"o",
".",
"Payload",
"=",
"payload",
"\n",
"return",
"o",
"\n",
"}"
] | // WithPayload adds the payload to the get identity unreachable response | [
"WithPayload",
"adds",
"the",
"payload",
"to",
"the",
"get",
"identity",
"unreachable",
"response"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/server/restapi/policy/get_identity_responses.go#L109-L112 |
162,359 | cilium/cilium | api/v1/server/restapi/policy/get_identity_responses.go | WithPayload | func (o *GetIdentityInvalidStorageFormat) WithPayload(payload models.Error) *GetIdentityInvalidStorageFormat {
o.Payload = payload
return o
} | go | func (o *GetIdentityInvalidStorageFormat) WithPayload(payload models.Error) *GetIdentityInvalidStorageFormat {
o.Payload = payload
return o
} | [
"func",
"(",
"o",
"*",
"GetIdentityInvalidStorageFormat",
")",
"WithPayload",
"(",
"payload",
"models",
".",
"Error",
")",
"*",
"GetIdentityInvalidStorageFormat",
"{",
"o",
".",
"Payload",
"=",
"payload",
"\n",
"return",
"o",
"\n",
"}"
] | // WithPayload adds the payload to the get identity invalid storage format response | [
"WithPayload",
"adds",
"the",
"payload",
"to",
"the",
"get",
"identity",
"invalid",
"storage",
"format",
"response"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/server/restapi/policy/get_identity_responses.go#L151-L154 |
162,360 | cilium/cilium | api/v1/models/trace_selector.go | Validate | func (m *TraceSelector) Validate(formats strfmt.Registry) error {
var res []error
if err := m.validateFrom(formats); err != nil {
res = append(res, err)
}
if err := m.validateTo(formats); err != nil {
res = append(res, err)
}
if len(res) > 0 {
return errors.CompositeValidationError(res...)
}
return nil
} | go | func (m *TraceSelector) Validate(formats strfmt.Registry) error {
var res []error
if err := m.validateFrom(formats); err != nil {
res = append(res, err)
}
if err := m.validateTo(formats); err != nil {
res = append(res, err)
}
if len(res) > 0 {
return errors.CompositeValidationError(res...)
}
return nil
} | [
"func",
"(",
"m",
"*",
"TraceSelector",
")",
"Validate",
"(",
"formats",
"strfmt",
".",
"Registry",
")",
"error",
"{",
"var",
"res",
"[",
"]",
"error",
"\n\n",
"if",
"err",
":=",
"m",
".",
"validateFrom",
"(",
"formats",
")",
";",
"err",
"!=",
"nil",
"{",
"res",
"=",
"append",
"(",
"res",
",",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"m",
".",
"validateTo",
"(",
"formats",
")",
";",
"err",
"!=",
"nil",
"{",
"res",
"=",
"append",
"(",
"res",
",",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"res",
")",
">",
"0",
"{",
"return",
"errors",
".",
"CompositeValidationError",
"(",
"res",
"...",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // Validate validates this trace selector | [
"Validate",
"validates",
"this",
"trace",
"selector"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/models/trace_selector.go#L31-L46 |
162,361 | cilium/cilium | proxylib/r2d2/r2d2parser.go | ruleParser | func ruleParser(rule *cilium.PortNetworkPolicyRule) []proxylib.L7NetworkPolicyRule {
l7Rules := rule.GetL7Rules()
var rules []proxylib.L7NetworkPolicyRule
if l7Rules == nil {
return rules
}
for _, l7Rule := range l7Rules.GetL7Rules() {
var rr r2d2Rule
for k, v := range l7Rule.Rule {
switch k {
case "cmd":
rr.cmdExact = v
case "file":
if v != "" {
rr.fileRegexCompiled = regexp.MustCompile(v)
}
default:
proxylib.ParseError(fmt.Sprintf("Unsupported key: %s", k), rule)
}
}
if rr.cmdExact != "" &&
rr.cmdExact != "READ" &&
rr.cmdExact != "WRITE" &&
rr.cmdExact != "HALT" &&
rr.cmdExact != "RESET" {
proxylib.ParseError(fmt.Sprintf("Unable to parse L7 r2d2 rule with invalid cmd: '%s'", rr.cmdExact), rule)
}
if (rr.fileRegexCompiled != nil) && !(rr.cmdExact == "" || rr.cmdExact == "READ" || rr.cmdExact == "WRITE") {
proxylib.ParseError(fmt.Sprintf("Unable to parse L7 r2d2 rule, cmd '%s' is not compatible with 'file'", rr.cmdExact), rule)
}
regexStr := ""
if rr.fileRegexCompiled != nil {
regexStr = rr.fileRegexCompiled.String()
}
log.Infof("Parsed rule '%s' '%s'", rr.cmdExact, regexStr)
rules = append(rules, &rr)
}
return rules
} | go | func ruleParser(rule *cilium.PortNetworkPolicyRule) []proxylib.L7NetworkPolicyRule {
l7Rules := rule.GetL7Rules()
var rules []proxylib.L7NetworkPolicyRule
if l7Rules == nil {
return rules
}
for _, l7Rule := range l7Rules.GetL7Rules() {
var rr r2d2Rule
for k, v := range l7Rule.Rule {
switch k {
case "cmd":
rr.cmdExact = v
case "file":
if v != "" {
rr.fileRegexCompiled = regexp.MustCompile(v)
}
default:
proxylib.ParseError(fmt.Sprintf("Unsupported key: %s", k), rule)
}
}
if rr.cmdExact != "" &&
rr.cmdExact != "READ" &&
rr.cmdExact != "WRITE" &&
rr.cmdExact != "HALT" &&
rr.cmdExact != "RESET" {
proxylib.ParseError(fmt.Sprintf("Unable to parse L7 r2d2 rule with invalid cmd: '%s'", rr.cmdExact), rule)
}
if (rr.fileRegexCompiled != nil) && !(rr.cmdExact == "" || rr.cmdExact == "READ" || rr.cmdExact == "WRITE") {
proxylib.ParseError(fmt.Sprintf("Unable to parse L7 r2d2 rule, cmd '%s' is not compatible with 'file'", rr.cmdExact), rule)
}
regexStr := ""
if rr.fileRegexCompiled != nil {
regexStr = rr.fileRegexCompiled.String()
}
log.Infof("Parsed rule '%s' '%s'", rr.cmdExact, regexStr)
rules = append(rules, &rr)
}
return rules
} | [
"func",
"ruleParser",
"(",
"rule",
"*",
"cilium",
".",
"PortNetworkPolicyRule",
")",
"[",
"]",
"proxylib",
".",
"L7NetworkPolicyRule",
"{",
"l7Rules",
":=",
"rule",
".",
"GetL7Rules",
"(",
")",
"\n",
"var",
"rules",
"[",
"]",
"proxylib",
".",
"L7NetworkPolicyRule",
"\n",
"if",
"l7Rules",
"==",
"nil",
"{",
"return",
"rules",
"\n",
"}",
"\n",
"for",
"_",
",",
"l7Rule",
":=",
"range",
"l7Rules",
".",
"GetL7Rules",
"(",
")",
"{",
"var",
"rr",
"r2d2Rule",
"\n",
"for",
"k",
",",
"v",
":=",
"range",
"l7Rule",
".",
"Rule",
"{",
"switch",
"k",
"{",
"case",
"\"",
"\"",
":",
"rr",
".",
"cmdExact",
"=",
"v",
"\n",
"case",
"\"",
"\"",
":",
"if",
"v",
"!=",
"\"",
"\"",
"{",
"rr",
".",
"fileRegexCompiled",
"=",
"regexp",
".",
"MustCompile",
"(",
"v",
")",
"\n",
"}",
"\n",
"default",
":",
"proxylib",
".",
"ParseError",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"k",
")",
",",
"rule",
")",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"rr",
".",
"cmdExact",
"!=",
"\"",
"\"",
"&&",
"rr",
".",
"cmdExact",
"!=",
"\"",
"\"",
"&&",
"rr",
".",
"cmdExact",
"!=",
"\"",
"\"",
"&&",
"rr",
".",
"cmdExact",
"!=",
"\"",
"\"",
"&&",
"rr",
".",
"cmdExact",
"!=",
"\"",
"\"",
"{",
"proxylib",
".",
"ParseError",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"rr",
".",
"cmdExact",
")",
",",
"rule",
")",
"\n",
"}",
"\n",
"if",
"(",
"rr",
".",
"fileRegexCompiled",
"!=",
"nil",
")",
"&&",
"!",
"(",
"rr",
".",
"cmdExact",
"==",
"\"",
"\"",
"||",
"rr",
".",
"cmdExact",
"==",
"\"",
"\"",
"||",
"rr",
".",
"cmdExact",
"==",
"\"",
"\"",
")",
"{",
"proxylib",
".",
"ParseError",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"rr",
".",
"cmdExact",
")",
",",
"rule",
")",
"\n",
"}",
"\n",
"regexStr",
":=",
"\"",
"\"",
"\n",
"if",
"rr",
".",
"fileRegexCompiled",
"!=",
"nil",
"{",
"regexStr",
"=",
"rr",
".",
"fileRegexCompiled",
".",
"String",
"(",
")",
"\n",
"}",
"\n",
"log",
".",
"Infof",
"(",
"\"",
"\"",
",",
"rr",
".",
"cmdExact",
",",
"regexStr",
")",
"\n",
"rules",
"=",
"append",
"(",
"rules",
",",
"&",
"rr",
")",
"\n",
"}",
"\n",
"return",
"rules",
"\n",
"}"
] | // ruleParser parses protobuf L7 rules to enforcement objects
// May panic | [
"ruleParser",
"parses",
"protobuf",
"L7",
"rules",
"to",
"enforcement",
"objects",
"May",
"panic"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/proxylib/r2d2/r2d2parser.go#L89-L127 |
162,362 | cilium/cilium | pkg/client/identity.go | IdentityGet | func (c *Client) IdentityGet(id string) (*models.Identity, error) {
params := policy.NewGetIdentityIDParams().WithID(id).WithTimeout(api.ClientTimeout)
resp, err := c.Policy.GetIdentityID(params)
if err != nil {
return nil, Hint(err)
}
return resp.Payload, nil
} | go | func (c *Client) IdentityGet(id string) (*models.Identity, error) {
params := policy.NewGetIdentityIDParams().WithID(id).WithTimeout(api.ClientTimeout)
resp, err := c.Policy.GetIdentityID(params)
if err != nil {
return nil, Hint(err)
}
return resp.Payload, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"IdentityGet",
"(",
"id",
"string",
")",
"(",
"*",
"models",
".",
"Identity",
",",
"error",
")",
"{",
"params",
":=",
"policy",
".",
"NewGetIdentityIDParams",
"(",
")",
".",
"WithID",
"(",
"id",
")",
".",
"WithTimeout",
"(",
"api",
".",
"ClientTimeout",
")",
"\n\n",
"resp",
",",
"err",
":=",
"c",
".",
"Policy",
".",
"GetIdentityID",
"(",
"params",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"Hint",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"resp",
".",
"Payload",
",",
"nil",
"\n",
"}"
] | // IdentityGet returns a security identity. | [
"IdentityGet",
"returns",
"a",
"security",
"identity",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/client/identity.go#L24-L32 |
162,363 | cilium/cilium | pkg/datapath/linux/utils.go | defineUint32 | func defineUint32(name string, value uint32) string {
return fmt.Sprintf("DEFINE_U32(%s, %#08x);\t/* %d */\n#define %s fetch_u32(%s)\n",
name, value, value, name, name)
} | go | func defineUint32(name string, value uint32) string {
return fmt.Sprintf("DEFINE_U32(%s, %#08x);\t/* %d */\n#define %s fetch_u32(%s)\n",
name, value, value, name, name)
} | [
"func",
"defineUint32",
"(",
"name",
"string",
",",
"value",
"uint32",
")",
"string",
"{",
"return",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\\t",
"\\n",
"\\n",
"\"",
",",
"name",
",",
"value",
",",
"value",
",",
"name",
",",
"name",
")",
"\n",
"}"
] | // defineUint32 writes the C definition for an unsigned 32-bit value. | [
"defineUint32",
"writes",
"the",
"C",
"definition",
"for",
"an",
"unsigned",
"32",
"-",
"bit",
"value",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/linux/utils.go#L50-L53 |
162,364 | cilium/cilium | pkg/datapath/linux/utils.go | defineIPv4 | func defineIPv4(name string, addr []byte) string {
if len(addr) != net.IPv4len {
return fmt.Sprintf("/* BUG: bad ip define %s %s */\n", name, goArray2C(addr))
}
nboAddr := byteorder.HostSliceToNetwork(addr, reflect.Uint32).(uint32)
return defineUint32(name, nboAddr)
} | go | func defineIPv4(name string, addr []byte) string {
if len(addr) != net.IPv4len {
return fmt.Sprintf("/* BUG: bad ip define %s %s */\n", name, goArray2C(addr))
}
nboAddr := byteorder.HostSliceToNetwork(addr, reflect.Uint32).(uint32)
return defineUint32(name, nboAddr)
} | [
"func",
"defineIPv4",
"(",
"name",
"string",
",",
"addr",
"[",
"]",
"byte",
")",
"string",
"{",
"if",
"len",
"(",
"addr",
")",
"!=",
"net",
".",
"IPv4len",
"{",
"return",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\\n",
"\"",
",",
"name",
",",
"goArray2C",
"(",
"addr",
")",
")",
"\n",
"}",
"\n",
"nboAddr",
":=",
"byteorder",
".",
"HostSliceToNetwork",
"(",
"addr",
",",
"reflect",
".",
"Uint32",
")",
".",
"(",
"uint32",
")",
"\n",
"return",
"defineUint32",
"(",
"name",
",",
"nboAddr",
")",
"\n",
"}"
] | // defineIPv4 writes the C definition for the given IPv4 address. | [
"defineIPv4",
"writes",
"the",
"C",
"definition",
"for",
"the",
"given",
"IPv4",
"address",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/linux/utils.go#L56-L62 |
162,365 | cilium/cilium | pkg/datapath/linux/utils.go | defineIPv6 | func defineIPv6(name string, addr []byte) string {
if len(addr) != net.IPv6len {
return fmt.Sprintf("/* BUG: bad ip define %s %s */\n", name, goArray2C(addr))
}
return fmt.Sprintf("DEFINE_IPV6(%s, %s);\n", name, goArray2C(addr))
} | go | func defineIPv6(name string, addr []byte) string {
if len(addr) != net.IPv6len {
return fmt.Sprintf("/* BUG: bad ip define %s %s */\n", name, goArray2C(addr))
}
return fmt.Sprintf("DEFINE_IPV6(%s, %s);\n", name, goArray2C(addr))
} | [
"func",
"defineIPv6",
"(",
"name",
"string",
",",
"addr",
"[",
"]",
"byte",
")",
"string",
"{",
"if",
"len",
"(",
"addr",
")",
"!=",
"net",
".",
"IPv6len",
"{",
"return",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\\n",
"\"",
",",
"name",
",",
"goArray2C",
"(",
"addr",
")",
")",
"\n",
"}",
"\n",
"return",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\\n",
"\"",
",",
"name",
",",
"goArray2C",
"(",
"addr",
")",
")",
"\n",
"}"
] | // defineIPv6 writes the C definition for the given IPv6 address. | [
"defineIPv6",
"writes",
"the",
"C",
"definition",
"for",
"the",
"given",
"IPv6",
"address",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/linux/utils.go#L65-L70 |
162,366 | cilium/cilium | pkg/datapath/linux/utils.go | defineMAC | func defineMAC(name string, addr []byte) string {
if len(addr) != 6 { /* MAC len */
return fmt.Sprintf("/* BUG: bad mac define %s %s */\n", name, goArray2C(addr))
}
return fmt.Sprintf("DEFINE_MAC(%s, %s);\n#define %s fetch_mac(%s)\n",
name, goArray2C(addr), name, name)
} | go | func defineMAC(name string, addr []byte) string {
if len(addr) != 6 { /* MAC len */
return fmt.Sprintf("/* BUG: bad mac define %s %s */\n", name, goArray2C(addr))
}
return fmt.Sprintf("DEFINE_MAC(%s, %s);\n#define %s fetch_mac(%s)\n",
name, goArray2C(addr), name, name)
} | [
"func",
"defineMAC",
"(",
"name",
"string",
",",
"addr",
"[",
"]",
"byte",
")",
"string",
"{",
"if",
"len",
"(",
"addr",
")",
"!=",
"6",
"{",
"/* MAC len */",
"return",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\\n",
"\"",
",",
"name",
",",
"goArray2C",
"(",
"addr",
")",
")",
"\n",
"}",
"\n",
"return",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\\n",
"\\n",
"\"",
",",
"name",
",",
"goArray2C",
"(",
"addr",
")",
",",
"name",
",",
"name",
")",
"\n",
"}"
] | // defineMAC writes the C definition for the given MAC name and addr. | [
"defineMAC",
"writes",
"the",
"C",
"definition",
"for",
"the",
"given",
"MAC",
"name",
"and",
"addr",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/linux/utils.go#L73-L79 |
162,367 | cilium/cilium | pkg/endpoint/events.go | Handle | func (ev *EndpointRegenerationEvent) Handle(res chan interface{}) {
e := ev.ep
owner := ev.owner
regenContext := ev.regenContext
err := e.RLockAlive()
if err != nil {
e.LogDisconnectedMutexAction(err, "before regeneration")
res <- &EndpointRegenerationResult{
err: err,
}
return
}
e.RUnlock()
// We should only queue the request after we use all the endpoint's
// lock/unlock. Otherwise this can get a deadlock if the endpoint is
// being deleted at the same time. More info PR-1777.
doneFunc, err := owner.QueueEndpointBuild(regenContext.parentContext, uint64(e.ID))
if err != nil {
e.getLogger().WithError(err).Warning("unable to queue endpoint build")
} else if doneFunc != nil {
e.getLogger().Debug("Dequeued endpoint from build queue")
regenContext.DoneFunc = doneFunc
err = ev.ep.regenerate(ev.owner, ev.regenContext)
doneFunc()
e.notifyEndpointRegeneration(owner, err)
} else {
// If another build has been queued for the endpoint, that means that
// that build will be able to take care of all of the work needed to
// regenerate the endpoint at this current point in time; queueing
// another build is a waste of resources.
e.getLogger().Debug("build not queued for endpoint because another build has already been queued")
}
res <- &EndpointRegenerationResult{
err: err,
}
return
} | go | func (ev *EndpointRegenerationEvent) Handle(res chan interface{}) {
e := ev.ep
owner := ev.owner
regenContext := ev.regenContext
err := e.RLockAlive()
if err != nil {
e.LogDisconnectedMutexAction(err, "before regeneration")
res <- &EndpointRegenerationResult{
err: err,
}
return
}
e.RUnlock()
// We should only queue the request after we use all the endpoint's
// lock/unlock. Otherwise this can get a deadlock if the endpoint is
// being deleted at the same time. More info PR-1777.
doneFunc, err := owner.QueueEndpointBuild(regenContext.parentContext, uint64(e.ID))
if err != nil {
e.getLogger().WithError(err).Warning("unable to queue endpoint build")
} else if doneFunc != nil {
e.getLogger().Debug("Dequeued endpoint from build queue")
regenContext.DoneFunc = doneFunc
err = ev.ep.regenerate(ev.owner, ev.regenContext)
doneFunc()
e.notifyEndpointRegeneration(owner, err)
} else {
// If another build has been queued for the endpoint, that means that
// that build will be able to take care of all of the work needed to
// regenerate the endpoint at this current point in time; queueing
// another build is a waste of resources.
e.getLogger().Debug("build not queued for endpoint because another build has already been queued")
}
res <- &EndpointRegenerationResult{
err: err,
}
return
} | [
"func",
"(",
"ev",
"*",
"EndpointRegenerationEvent",
")",
"Handle",
"(",
"res",
"chan",
"interface",
"{",
"}",
")",
"{",
"e",
":=",
"ev",
".",
"ep",
"\n",
"owner",
":=",
"ev",
".",
"owner",
"\n",
"regenContext",
":=",
"ev",
".",
"regenContext",
"\n\n",
"err",
":=",
"e",
".",
"RLockAlive",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"e",
".",
"LogDisconnectedMutexAction",
"(",
"err",
",",
"\"",
"\"",
")",
"\n",
"res",
"<-",
"&",
"EndpointRegenerationResult",
"{",
"err",
":",
"err",
",",
"}",
"\n\n",
"return",
"\n",
"}",
"\n",
"e",
".",
"RUnlock",
"(",
")",
"\n\n",
"// We should only queue the request after we use all the endpoint's",
"// lock/unlock. Otherwise this can get a deadlock if the endpoint is",
"// being deleted at the same time. More info PR-1777.",
"doneFunc",
",",
"err",
":=",
"owner",
".",
"QueueEndpointBuild",
"(",
"regenContext",
".",
"parentContext",
",",
"uint64",
"(",
"e",
".",
"ID",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"e",
".",
"getLogger",
"(",
")",
".",
"WithError",
"(",
"err",
")",
".",
"Warning",
"(",
"\"",
"\"",
")",
"\n",
"}",
"else",
"if",
"doneFunc",
"!=",
"nil",
"{",
"e",
".",
"getLogger",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n\n",
"regenContext",
".",
"DoneFunc",
"=",
"doneFunc",
"\n\n",
"err",
"=",
"ev",
".",
"ep",
".",
"regenerate",
"(",
"ev",
".",
"owner",
",",
"ev",
".",
"regenContext",
")",
"\n\n",
"doneFunc",
"(",
")",
"\n",
"e",
".",
"notifyEndpointRegeneration",
"(",
"owner",
",",
"err",
")",
"\n",
"}",
"else",
"{",
"// If another build has been queued for the endpoint, that means that",
"// that build will be able to take care of all of the work needed to",
"// regenerate the endpoint at this current point in time; queueing",
"// another build is a waste of resources.",
"e",
".",
"getLogger",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"res",
"<-",
"&",
"EndpointRegenerationResult",
"{",
"err",
":",
"err",
",",
"}",
"\n",
"return",
"\n",
"}"
] | // Handle handles the regeneration event for the endpoint. | [
"Handle",
"handles",
"the",
"regeneration",
"event",
"for",
"the",
"endpoint",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/endpoint/events.go#L29-L72 |
162,368 | cilium/cilium | pkg/endpoint/events.go | Handle | func (ev *EndpointRevisionBumpEvent) Handle(res chan interface{}) {
// TODO: if the endpoint is not in a 'ready' state that means that
// we cannot set the policy revision, as something else has
// changed endpoint state which necessitates regeneration,
// *or* the endpoint is in a not-ready state (i.e., a prior
// regeneration failed, so there is no way that we can
// realize the policy revision yet. Should this be signaled
// to the routine waiting for the result of this event?
ev.ep.SetPolicyRevision(ev.Rev)
res <- struct{}{}
} | go | func (ev *EndpointRevisionBumpEvent) Handle(res chan interface{}) {
// TODO: if the endpoint is not in a 'ready' state that means that
// we cannot set the policy revision, as something else has
// changed endpoint state which necessitates regeneration,
// *or* the endpoint is in a not-ready state (i.e., a prior
// regeneration failed, so there is no way that we can
// realize the policy revision yet. Should this be signaled
// to the routine waiting for the result of this event?
ev.ep.SetPolicyRevision(ev.Rev)
res <- struct{}{}
} | [
"func",
"(",
"ev",
"*",
"EndpointRevisionBumpEvent",
")",
"Handle",
"(",
"res",
"chan",
"interface",
"{",
"}",
")",
"{",
"// TODO: if the endpoint is not in a 'ready' state that means that",
"// we cannot set the policy revision, as something else has",
"// changed endpoint state which necessitates regeneration,",
"// *or* the endpoint is in a not-ready state (i.e., a prior",
"// regeneration failed, so there is no way that we can",
"// realize the policy revision yet. Should this be signaled",
"// to the routine waiting for the result of this event?",
"ev",
".",
"ep",
".",
"SetPolicyRevision",
"(",
"ev",
".",
"Rev",
")",
"\n",
"res",
"<-",
"struct",
"{",
"}",
"{",
"}",
"\n",
"}"
] | // Handle handles the revision bump event for the Endpoint. | [
"Handle",
"handles",
"the",
"revision",
"bump",
"event",
"for",
"the",
"Endpoint",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/endpoint/events.go#L87-L97 |
162,369 | cilium/cilium | pkg/endpoint/events.go | PolicyRevisionBumpEvent | func (e *Endpoint) PolicyRevisionBumpEvent(rev uint64) {
epBumpEvent := eventqueue.NewEvent(&EndpointRevisionBumpEvent{Rev: rev, ep: e})
// Don't care about policy revision event results - it is best effort.
_ = e.EventQueue.Enqueue(epBumpEvent)
} | go | func (e *Endpoint) PolicyRevisionBumpEvent(rev uint64) {
epBumpEvent := eventqueue.NewEvent(&EndpointRevisionBumpEvent{Rev: rev, ep: e})
// Don't care about policy revision event results - it is best effort.
_ = e.EventQueue.Enqueue(epBumpEvent)
} | [
"func",
"(",
"e",
"*",
"Endpoint",
")",
"PolicyRevisionBumpEvent",
"(",
"rev",
"uint64",
")",
"{",
"epBumpEvent",
":=",
"eventqueue",
".",
"NewEvent",
"(",
"&",
"EndpointRevisionBumpEvent",
"{",
"Rev",
":",
"rev",
",",
"ep",
":",
"e",
"}",
")",
"\n",
"// Don't care about policy revision event results - it is best effort.",
"_",
"=",
"e",
".",
"EventQueue",
".",
"Enqueue",
"(",
"epBumpEvent",
")",
"\n",
"}"
] | // PolicyRevisionBumpEvent queues an event for the given endpoint to set its
// realized policy revision to rev. This may block depending on if events have
// been queued up for the given endpoint. It blocks until the event has
// succeeded, or if the event has been cancelled. | [
"PolicyRevisionBumpEvent",
"queues",
"an",
"event",
"for",
"the",
"given",
"endpoint",
"to",
"set",
"its",
"realized",
"policy",
"revision",
"to",
"rev",
".",
"This",
"may",
"block",
"depending",
"on",
"if",
"events",
"have",
"been",
"queued",
"up",
"for",
"the",
"given",
"endpoint",
".",
"It",
"blocks",
"until",
"the",
"event",
"has",
"succeeded",
"or",
"if",
"the",
"event",
"has",
"been",
"cancelled",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/endpoint/events.go#L103-L107 |
162,370 | cilium/cilium | pkg/revert/revert.go | Push | func (s *RevertStack) Push(revertFunc RevertFunc) {
if revertFunc != nil {
s.revertFuncs = append(s.revertFuncs, revertFunc)
}
} | go | func (s *RevertStack) Push(revertFunc RevertFunc) {
if revertFunc != nil {
s.revertFuncs = append(s.revertFuncs, revertFunc)
}
} | [
"func",
"(",
"s",
"*",
"RevertStack",
")",
"Push",
"(",
"revertFunc",
"RevertFunc",
")",
"{",
"if",
"revertFunc",
"!=",
"nil",
"{",
"s",
".",
"revertFuncs",
"=",
"append",
"(",
"s",
".",
"revertFuncs",
",",
"revertFunc",
")",
"\n",
"}",
"\n",
"}"
] | // Push pushes the given RevertFunc on top of this stack. If the function is
// nil, it is ignored. | [
"Push",
"pushes",
"the",
"given",
"RevertFunc",
"on",
"top",
"of",
"this",
"stack",
".",
"If",
"the",
"function",
"is",
"nil",
"it",
"is",
"ignored",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/revert/revert.go#L34-L38 |
162,371 | cilium/cilium | pkg/revert/revert.go | Revert | func (s *RevertStack) Revert() error {
for i := len(s.revertFuncs) - 1; i >= 0; i-- {
if err := s.revertFuncs[i](); err != nil {
return fmt.Errorf("failed to execute revert function; skipping %d revert functions: %s", i, err)
}
}
return nil
} | go | func (s *RevertStack) Revert() error {
for i := len(s.revertFuncs) - 1; i >= 0; i-- {
if err := s.revertFuncs[i](); err != nil {
return fmt.Errorf("failed to execute revert function; skipping %d revert functions: %s", i, err)
}
}
return nil
} | [
"func",
"(",
"s",
"*",
"RevertStack",
")",
"Revert",
"(",
")",
"error",
"{",
"for",
"i",
":=",
"len",
"(",
"s",
".",
"revertFuncs",
")",
"-",
"1",
";",
"i",
">=",
"0",
";",
"i",
"--",
"{",
"if",
"err",
":=",
"s",
".",
"revertFuncs",
"[",
"i",
"]",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"i",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // Revert executes all the RevertFuncs in the given stack in the reverse order
// they were pushed. | [
"Revert",
"executes",
"all",
"the",
"RevertFuncs",
"in",
"the",
"given",
"stack",
"in",
"the",
"reverse",
"order",
"they",
"were",
"pushed",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/revert/revert.go#L42-L49 |
162,372 | cilium/cilium | api/v1/models/l4_policy.go | Validate | func (m *L4Policy) Validate(formats strfmt.Registry) error {
var res []error
if err := m.validateEgress(formats); err != nil {
res = append(res, err)
}
if err := m.validateIngress(formats); err != nil {
res = append(res, err)
}
if len(res) > 0 {
return errors.CompositeValidationError(res...)
}
return nil
} | go | func (m *L4Policy) Validate(formats strfmt.Registry) error {
var res []error
if err := m.validateEgress(formats); err != nil {
res = append(res, err)
}
if err := m.validateIngress(formats); err != nil {
res = append(res, err)
}
if len(res) > 0 {
return errors.CompositeValidationError(res...)
}
return nil
} | [
"func",
"(",
"m",
"*",
"L4Policy",
")",
"Validate",
"(",
"formats",
"strfmt",
".",
"Registry",
")",
"error",
"{",
"var",
"res",
"[",
"]",
"error",
"\n\n",
"if",
"err",
":=",
"m",
".",
"validateEgress",
"(",
"formats",
")",
";",
"err",
"!=",
"nil",
"{",
"res",
"=",
"append",
"(",
"res",
",",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"m",
".",
"validateIngress",
"(",
"formats",
")",
";",
"err",
"!=",
"nil",
"{",
"res",
"=",
"append",
"(",
"res",
",",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"res",
")",
">",
"0",
"{",
"return",
"errors",
".",
"CompositeValidationError",
"(",
"res",
"...",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // Validate validates this l4 policy | [
"Validate",
"validates",
"this",
"l4",
"policy"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/models/l4_policy.go#L29-L44 |
162,373 | cilium/cilium | api/v1/server/restapi/daemon/get_map_responses.go | WithPayload | func (o *GetMapOK) WithPayload(payload *models.BPFMapList) *GetMapOK {
o.Payload = payload
return o
} | go | func (o *GetMapOK) WithPayload(payload *models.BPFMapList) *GetMapOK {
o.Payload = payload
return o
} | [
"func",
"(",
"o",
"*",
"GetMapOK",
")",
"WithPayload",
"(",
"payload",
"*",
"models",
".",
"BPFMapList",
")",
"*",
"GetMapOK",
"{",
"o",
".",
"Payload",
"=",
"payload",
"\n",
"return",
"o",
"\n",
"}"
] | // WithPayload adds the payload to the get map o k response | [
"WithPayload",
"adds",
"the",
"payload",
"to",
"the",
"get",
"map",
"o",
"k",
"response"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/server/restapi/daemon/get_map_responses.go#L38-L41 |
162,374 | cilium/cilium | api/v1/server/restapi/service/get_service_id_responses.go | WithPayload | func (o *GetServiceIDOK) WithPayload(payload *models.Service) *GetServiceIDOK {
o.Payload = payload
return o
} | go | func (o *GetServiceIDOK) WithPayload(payload *models.Service) *GetServiceIDOK {
o.Payload = payload
return o
} | [
"func",
"(",
"o",
"*",
"GetServiceIDOK",
")",
"WithPayload",
"(",
"payload",
"*",
"models",
".",
"Service",
")",
"*",
"GetServiceIDOK",
"{",
"o",
".",
"Payload",
"=",
"payload",
"\n",
"return",
"o",
"\n",
"}"
] | // WithPayload adds the payload to the get service Id o k response | [
"WithPayload",
"adds",
"the",
"payload",
"to",
"the",
"get",
"service",
"Id",
"o",
"k",
"response"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/server/restapi/service/get_service_id_responses.go#L38-L41 |
162,375 | cilium/cilium | pkg/client/policy.go | PolicyPut | func (c *Client) PolicyPut(policyJSON string) (*models.Policy, error) {
params := policy.NewPutPolicyParams().WithPolicy(policyJSON).WithTimeout(api.ClientTimeout)
resp, err := c.Policy.PutPolicy(params)
if err != nil {
return nil, Hint(err)
}
return resp.Payload, nil
} | go | func (c *Client) PolicyPut(policyJSON string) (*models.Policy, error) {
params := policy.NewPutPolicyParams().WithPolicy(policyJSON).WithTimeout(api.ClientTimeout)
resp, err := c.Policy.PutPolicy(params)
if err != nil {
return nil, Hint(err)
}
return resp.Payload, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"PolicyPut",
"(",
"policyJSON",
"string",
")",
"(",
"*",
"models",
".",
"Policy",
",",
"error",
")",
"{",
"params",
":=",
"policy",
".",
"NewPutPolicyParams",
"(",
")",
".",
"WithPolicy",
"(",
"policyJSON",
")",
".",
"WithTimeout",
"(",
"api",
".",
"ClientTimeout",
")",
"\n",
"resp",
",",
"err",
":=",
"c",
".",
"Policy",
".",
"PutPolicy",
"(",
"params",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"Hint",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"resp",
".",
"Payload",
",",
"nil",
"\n",
"}"
] | // PolicyPut inserts the `policyJSON` | [
"PolicyPut",
"inserts",
"the",
"policyJSON"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/client/policy.go#L24-L31 |
162,376 | cilium/cilium | pkg/client/policy.go | PolicyGet | func (c *Client) PolicyGet(labels []string) (*models.Policy, error) {
params := policy.NewGetPolicyParams().WithLabels(labels).WithTimeout(api.ClientTimeout)
resp, err := c.Policy.GetPolicy(params)
if err != nil {
return nil, Hint(err)
}
return resp.Payload, nil
} | go | func (c *Client) PolicyGet(labels []string) (*models.Policy, error) {
params := policy.NewGetPolicyParams().WithLabels(labels).WithTimeout(api.ClientTimeout)
resp, err := c.Policy.GetPolicy(params)
if err != nil {
return nil, Hint(err)
}
return resp.Payload, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"PolicyGet",
"(",
"labels",
"[",
"]",
"string",
")",
"(",
"*",
"models",
".",
"Policy",
",",
"error",
")",
"{",
"params",
":=",
"policy",
".",
"NewGetPolicyParams",
"(",
")",
".",
"WithLabels",
"(",
"labels",
")",
".",
"WithTimeout",
"(",
"api",
".",
"ClientTimeout",
")",
"\n",
"resp",
",",
"err",
":=",
"c",
".",
"Policy",
".",
"GetPolicy",
"(",
"params",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"Hint",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"resp",
".",
"Payload",
",",
"nil",
"\n",
"}"
] | // PolicyGet returns policy rules | [
"PolicyGet",
"returns",
"policy",
"rules"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/client/policy.go#L34-L41 |
162,377 | cilium/cilium | pkg/client/policy.go | PolicyDelete | func (c *Client) PolicyDelete(labels []string) (*models.Policy, error) {
params := policy.NewDeletePolicyParams().WithLabels(labels).WithTimeout(api.ClientTimeout)
resp, err := c.Policy.DeletePolicy(params)
if err != nil {
return nil, Hint(err)
}
return resp.Payload, Hint(err)
} | go | func (c *Client) PolicyDelete(labels []string) (*models.Policy, error) {
params := policy.NewDeletePolicyParams().WithLabels(labels).WithTimeout(api.ClientTimeout)
resp, err := c.Policy.DeletePolicy(params)
if err != nil {
return nil, Hint(err)
}
return resp.Payload, Hint(err)
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"PolicyDelete",
"(",
"labels",
"[",
"]",
"string",
")",
"(",
"*",
"models",
".",
"Policy",
",",
"error",
")",
"{",
"params",
":=",
"policy",
".",
"NewDeletePolicyParams",
"(",
")",
".",
"WithLabels",
"(",
"labels",
")",
".",
"WithTimeout",
"(",
"api",
".",
"ClientTimeout",
")",
"\n",
"resp",
",",
"err",
":=",
"c",
".",
"Policy",
".",
"DeletePolicy",
"(",
"params",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"Hint",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"resp",
".",
"Payload",
",",
"Hint",
"(",
"err",
")",
"\n",
"}"
] | // PolicyDelete deletes policy rules | [
"PolicyDelete",
"deletes",
"policy",
"rules"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/client/policy.go#L44-L51 |
162,378 | cilium/cilium | pkg/client/policy.go | PolicyResolveGet | func (c *Client) PolicyResolveGet(traceSelector *models.TraceSelector) (*models.PolicyTraceResult, error) {
params := policy.NewGetPolicyResolveParams().WithTraceSelector(traceSelector).WithTimeout(api.ClientTimeout)
resp, err := c.Policy.GetPolicyResolve(params)
if err != nil {
return nil, Hint(err)
}
return resp.Payload, nil
} | go | func (c *Client) PolicyResolveGet(traceSelector *models.TraceSelector) (*models.PolicyTraceResult, error) {
params := policy.NewGetPolicyResolveParams().WithTraceSelector(traceSelector).WithTimeout(api.ClientTimeout)
resp, err := c.Policy.GetPolicyResolve(params)
if err != nil {
return nil, Hint(err)
}
return resp.Payload, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"PolicyResolveGet",
"(",
"traceSelector",
"*",
"models",
".",
"TraceSelector",
")",
"(",
"*",
"models",
".",
"PolicyTraceResult",
",",
"error",
")",
"{",
"params",
":=",
"policy",
".",
"NewGetPolicyResolveParams",
"(",
")",
".",
"WithTraceSelector",
"(",
"traceSelector",
")",
".",
"WithTimeout",
"(",
"api",
".",
"ClientTimeout",
")",
"\n",
"resp",
",",
"err",
":=",
"c",
".",
"Policy",
".",
"GetPolicyResolve",
"(",
"params",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"Hint",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"resp",
".",
"Payload",
",",
"nil",
"\n",
"}"
] | // PolicyResolveGet resolves policy for a Trace Selector with source and destination identity. | [
"PolicyResolveGet",
"resolves",
"policy",
"for",
"a",
"Trace",
"Selector",
"with",
"source",
"and",
"destination",
"identity",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/client/policy.go#L54-L61 |
162,379 | cilium/cilium | pkg/k8s/client/listers/cilium.io/v2/ciliumnetworkpolicy.go | List | func (s *ciliumNetworkPolicyLister) List(selector labels.Selector) (ret []*v2.CiliumNetworkPolicy, err error) {
err = cache.ListAll(s.indexer, selector, func(m interface{}) {
ret = append(ret, m.(*v2.CiliumNetworkPolicy))
})
return ret, err
} | go | func (s *ciliumNetworkPolicyLister) List(selector labels.Selector) (ret []*v2.CiliumNetworkPolicy, err error) {
err = cache.ListAll(s.indexer, selector, func(m interface{}) {
ret = append(ret, m.(*v2.CiliumNetworkPolicy))
})
return ret, err
} | [
"func",
"(",
"s",
"*",
"ciliumNetworkPolicyLister",
")",
"List",
"(",
"selector",
"labels",
".",
"Selector",
")",
"(",
"ret",
"[",
"]",
"*",
"v2",
".",
"CiliumNetworkPolicy",
",",
"err",
"error",
")",
"{",
"err",
"=",
"cache",
".",
"ListAll",
"(",
"s",
".",
"indexer",
",",
"selector",
",",
"func",
"(",
"m",
"interface",
"{",
"}",
")",
"{",
"ret",
"=",
"append",
"(",
"ret",
",",
"m",
".",
"(",
"*",
"v2",
".",
"CiliumNetworkPolicy",
")",
")",
"\n",
"}",
")",
"\n",
"return",
"ret",
",",
"err",
"\n",
"}"
] | // List lists all CiliumNetworkPolicies in the indexer. | [
"List",
"lists",
"all",
"CiliumNetworkPolicies",
"in",
"the",
"indexer",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/k8s/client/listers/cilium.io/v2/ciliumnetworkpolicy.go#L46-L51 |
162,380 | cilium/cilium | pkg/k8s/client/listers/cilium.io/v2/ciliumnetworkpolicy.go | CiliumNetworkPolicies | func (s *ciliumNetworkPolicyLister) CiliumNetworkPolicies(namespace string) CiliumNetworkPolicyNamespaceLister {
return ciliumNetworkPolicyNamespaceLister{indexer: s.indexer, namespace: namespace}
} | go | func (s *ciliumNetworkPolicyLister) CiliumNetworkPolicies(namespace string) CiliumNetworkPolicyNamespaceLister {
return ciliumNetworkPolicyNamespaceLister{indexer: s.indexer, namespace: namespace}
} | [
"func",
"(",
"s",
"*",
"ciliumNetworkPolicyLister",
")",
"CiliumNetworkPolicies",
"(",
"namespace",
"string",
")",
"CiliumNetworkPolicyNamespaceLister",
"{",
"return",
"ciliumNetworkPolicyNamespaceLister",
"{",
"indexer",
":",
"s",
".",
"indexer",
",",
"namespace",
":",
"namespace",
"}",
"\n",
"}"
] | // CiliumNetworkPolicies returns an object that can list and get CiliumNetworkPolicies. | [
"CiliumNetworkPolicies",
"returns",
"an",
"object",
"that",
"can",
"list",
"and",
"get",
"CiliumNetworkPolicies",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/k8s/client/listers/cilium.io/v2/ciliumnetworkpolicy.go#L54-L56 |
162,381 | cilium/cilium | pkg/k8s/client/listers/cilium.io/v2/ciliumnetworkpolicy.go | List | func (s ciliumNetworkPolicyNamespaceLister) List(selector labels.Selector) (ret []*v2.CiliumNetworkPolicy, err error) {
err = cache.ListAllByNamespace(s.indexer, s.namespace, selector, func(m interface{}) {
ret = append(ret, m.(*v2.CiliumNetworkPolicy))
})
return ret, err
} | go | func (s ciliumNetworkPolicyNamespaceLister) List(selector labels.Selector) (ret []*v2.CiliumNetworkPolicy, err error) {
err = cache.ListAllByNamespace(s.indexer, s.namespace, selector, func(m interface{}) {
ret = append(ret, m.(*v2.CiliumNetworkPolicy))
})
return ret, err
} | [
"func",
"(",
"s",
"ciliumNetworkPolicyNamespaceLister",
")",
"List",
"(",
"selector",
"labels",
".",
"Selector",
")",
"(",
"ret",
"[",
"]",
"*",
"v2",
".",
"CiliumNetworkPolicy",
",",
"err",
"error",
")",
"{",
"err",
"=",
"cache",
".",
"ListAllByNamespace",
"(",
"s",
".",
"indexer",
",",
"s",
".",
"namespace",
",",
"selector",
",",
"func",
"(",
"m",
"interface",
"{",
"}",
")",
"{",
"ret",
"=",
"append",
"(",
"ret",
",",
"m",
".",
"(",
"*",
"v2",
".",
"CiliumNetworkPolicy",
")",
")",
"\n",
"}",
")",
"\n",
"return",
"ret",
",",
"err",
"\n",
"}"
] | // List lists all CiliumNetworkPolicies in the indexer for a given namespace. | [
"List",
"lists",
"all",
"CiliumNetworkPolicies",
"in",
"the",
"indexer",
"for",
"a",
"given",
"namespace",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/k8s/client/listers/cilium.io/v2/ciliumnetworkpolicy.go#L75-L80 |
162,382 | cilium/cilium | cilium/cmd/helpers.go | expandNestedJSON | func expandNestedJSON(result bytes.Buffer) (bytes.Buffer, error) {
reStringWithJSON := regexp.MustCompile(`"[^"\\{]*{.*[^\\]"`)
reJSON := regexp.MustCompile(`{.*}`)
for {
var (
loc []int
indent string
)
// Search for nested JSON; if we don't find any, then break.
resBytes := result.Bytes()
if loc = reStringWithJSON.FindIndex(resBytes); loc == nil {
break
}
// Determine the current indentation
for i := 0; i < loc[0]-1; i++ {
idx := loc[0] - i - 1
if resBytes[idx] != ' ' {
break
}
indent = fmt.Sprintf("\t%s\t", indent)
}
stringStart := loc[0]
stringEnd := loc[1]
// Unquote the string with the nested json.
quotedBytes := resBytes[stringStart:stringEnd]
unquoted, err := strconv.Unquote(string(quotedBytes))
if err != nil {
return bytes.Buffer{}, fmt.Errorf("Failed to Unquote string: %s\n%s", err.Error(), string(quotedBytes))
}
// Find the JSON within the quoted string.
nestedStart := 0
nestedEnd := 0
if locs := reJSON.FindAllStringIndex(unquoted, -1); locs != nil {
// The last match is the longest one.
last := len(locs) - 1
nestedStart = locs[last][0]
nestedEnd = locs[last][1]
} else if reJSON.Match(quotedBytes) {
// The entire string is JSON
nestedEnd = len(unquoted)
}
// Decode the nested JSON
decoded := ""
if nestedEnd != 0 {
m := make(map[string]interface{})
nested := bytes.NewBufferString(unquoted[nestedStart:nestedEnd])
if err := json.NewDecoder(nested).Decode(&m); err != nil {
return bytes.Buffer{}, fmt.Errorf("Failed to decode nested JSON: %s", err.Error())
}
decodedBytes, err := json.MarshalIndent(m, indent, " ")
if err != nil {
return bytes.Buffer{}, fmt.Errorf("Cannot marshal nested JSON: %s", err.Error())
}
decoded = string(decodedBytes)
}
// Serialize
nextResult := bytes.Buffer{}
nextResult.Write(resBytes[0:stringStart])
nextResult.WriteString(string(unquoted[:nestedStart]))
nextResult.WriteString(string(decoded))
nextResult.WriteString(string(unquoted[nestedEnd:]))
nextResult.Write(resBytes[stringEnd:])
result = nextResult
}
return result, nil
} | go | func expandNestedJSON(result bytes.Buffer) (bytes.Buffer, error) {
reStringWithJSON := regexp.MustCompile(`"[^"\\{]*{.*[^\\]"`)
reJSON := regexp.MustCompile(`{.*}`)
for {
var (
loc []int
indent string
)
// Search for nested JSON; if we don't find any, then break.
resBytes := result.Bytes()
if loc = reStringWithJSON.FindIndex(resBytes); loc == nil {
break
}
// Determine the current indentation
for i := 0; i < loc[0]-1; i++ {
idx := loc[0] - i - 1
if resBytes[idx] != ' ' {
break
}
indent = fmt.Sprintf("\t%s\t", indent)
}
stringStart := loc[0]
stringEnd := loc[1]
// Unquote the string with the nested json.
quotedBytes := resBytes[stringStart:stringEnd]
unquoted, err := strconv.Unquote(string(quotedBytes))
if err != nil {
return bytes.Buffer{}, fmt.Errorf("Failed to Unquote string: %s\n%s", err.Error(), string(quotedBytes))
}
// Find the JSON within the quoted string.
nestedStart := 0
nestedEnd := 0
if locs := reJSON.FindAllStringIndex(unquoted, -1); locs != nil {
// The last match is the longest one.
last := len(locs) - 1
nestedStart = locs[last][0]
nestedEnd = locs[last][1]
} else if reJSON.Match(quotedBytes) {
// The entire string is JSON
nestedEnd = len(unquoted)
}
// Decode the nested JSON
decoded := ""
if nestedEnd != 0 {
m := make(map[string]interface{})
nested := bytes.NewBufferString(unquoted[nestedStart:nestedEnd])
if err := json.NewDecoder(nested).Decode(&m); err != nil {
return bytes.Buffer{}, fmt.Errorf("Failed to decode nested JSON: %s", err.Error())
}
decodedBytes, err := json.MarshalIndent(m, indent, " ")
if err != nil {
return bytes.Buffer{}, fmt.Errorf("Cannot marshal nested JSON: %s", err.Error())
}
decoded = string(decodedBytes)
}
// Serialize
nextResult := bytes.Buffer{}
nextResult.Write(resBytes[0:stringStart])
nextResult.WriteString(string(unquoted[:nestedStart]))
nextResult.WriteString(string(decoded))
nextResult.WriteString(string(unquoted[nestedEnd:]))
nextResult.Write(resBytes[stringEnd:])
result = nextResult
}
return result, nil
} | [
"func",
"expandNestedJSON",
"(",
"result",
"bytes",
".",
"Buffer",
")",
"(",
"bytes",
".",
"Buffer",
",",
"error",
")",
"{",
"reStringWithJSON",
":=",
"regexp",
".",
"MustCompile",
"(",
"`\"[^\"\\\\{]*{.*[^\\\\]\"`",
")",
"\n",
"reJSON",
":=",
"regexp",
".",
"MustCompile",
"(",
"`{.*}`",
")",
"\n",
"for",
"{",
"var",
"(",
"loc",
"[",
"]",
"int",
"\n",
"indent",
"string",
"\n",
")",
"\n\n",
"// Search for nested JSON; if we don't find any, then break.",
"resBytes",
":=",
"result",
".",
"Bytes",
"(",
")",
"\n",
"if",
"loc",
"=",
"reStringWithJSON",
".",
"FindIndex",
"(",
"resBytes",
")",
";",
"loc",
"==",
"nil",
"{",
"break",
"\n",
"}",
"\n\n",
"// Determine the current indentation",
"for",
"i",
":=",
"0",
";",
"i",
"<",
"loc",
"[",
"0",
"]",
"-",
"1",
";",
"i",
"++",
"{",
"idx",
":=",
"loc",
"[",
"0",
"]",
"-",
"i",
"-",
"1",
"\n",
"if",
"resBytes",
"[",
"idx",
"]",
"!=",
"' '",
"{",
"break",
"\n",
"}",
"\n",
"indent",
"=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\\t",
"\\t",
"\"",
",",
"indent",
")",
"\n",
"}",
"\n\n",
"stringStart",
":=",
"loc",
"[",
"0",
"]",
"\n",
"stringEnd",
":=",
"loc",
"[",
"1",
"]",
"\n\n",
"// Unquote the string with the nested json.",
"quotedBytes",
":=",
"resBytes",
"[",
"stringStart",
":",
"stringEnd",
"]",
"\n",
"unquoted",
",",
"err",
":=",
"strconv",
".",
"Unquote",
"(",
"string",
"(",
"quotedBytes",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"bytes",
".",
"Buffer",
"{",
"}",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\\n",
"\"",
",",
"err",
".",
"Error",
"(",
")",
",",
"string",
"(",
"quotedBytes",
")",
")",
"\n",
"}",
"\n\n",
"// Find the JSON within the quoted string.",
"nestedStart",
":=",
"0",
"\n",
"nestedEnd",
":=",
"0",
"\n",
"if",
"locs",
":=",
"reJSON",
".",
"FindAllStringIndex",
"(",
"unquoted",
",",
"-",
"1",
")",
";",
"locs",
"!=",
"nil",
"{",
"// The last match is the longest one.",
"last",
":=",
"len",
"(",
"locs",
")",
"-",
"1",
"\n",
"nestedStart",
"=",
"locs",
"[",
"last",
"]",
"[",
"0",
"]",
"\n",
"nestedEnd",
"=",
"locs",
"[",
"last",
"]",
"[",
"1",
"]",
"\n",
"}",
"else",
"if",
"reJSON",
".",
"Match",
"(",
"quotedBytes",
")",
"{",
"// The entire string is JSON",
"nestedEnd",
"=",
"len",
"(",
"unquoted",
")",
"\n",
"}",
"\n\n",
"// Decode the nested JSON",
"decoded",
":=",
"\"",
"\"",
"\n",
"if",
"nestedEnd",
"!=",
"0",
"{",
"m",
":=",
"make",
"(",
"map",
"[",
"string",
"]",
"interface",
"{",
"}",
")",
"\n",
"nested",
":=",
"bytes",
".",
"NewBufferString",
"(",
"unquoted",
"[",
"nestedStart",
":",
"nestedEnd",
"]",
")",
"\n",
"if",
"err",
":=",
"json",
".",
"NewDecoder",
"(",
"nested",
")",
".",
"Decode",
"(",
"&",
"m",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"bytes",
".",
"Buffer",
"{",
"}",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n",
"decodedBytes",
",",
"err",
":=",
"json",
".",
"MarshalIndent",
"(",
"m",
",",
"indent",
",",
"\"",
"\"",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"bytes",
".",
"Buffer",
"{",
"}",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n",
"decoded",
"=",
"string",
"(",
"decodedBytes",
")",
"\n",
"}",
"\n\n",
"// Serialize",
"nextResult",
":=",
"bytes",
".",
"Buffer",
"{",
"}",
"\n",
"nextResult",
".",
"Write",
"(",
"resBytes",
"[",
"0",
":",
"stringStart",
"]",
")",
"\n",
"nextResult",
".",
"WriteString",
"(",
"string",
"(",
"unquoted",
"[",
":",
"nestedStart",
"]",
")",
")",
"\n",
"nextResult",
".",
"WriteString",
"(",
"string",
"(",
"decoded",
")",
")",
"\n",
"nextResult",
".",
"WriteString",
"(",
"string",
"(",
"unquoted",
"[",
"nestedEnd",
":",
"]",
")",
")",
"\n",
"nextResult",
".",
"Write",
"(",
"resBytes",
"[",
"stringEnd",
":",
"]",
")",
"\n",
"result",
"=",
"nextResult",
"\n",
"}",
"\n\n",
"return",
"result",
",",
"nil",
"\n",
"}"
] | // Search 'result' for strings with escaped JSON inside, and expand the JSON. | [
"Search",
"result",
"for",
"strings",
"with",
"escaped",
"JSON",
"inside",
"and",
"expand",
"the",
"JSON",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/cilium/cmd/helpers.go#L122-L195 |
162,383 | cilium/cilium | cilium/cmd/helpers.go | parseTrafficString | func parseTrafficString(td string) (trafficdirection.TrafficDirection, error) {
lowered := strings.ToLower(td)
switch lowered {
case "ingress":
return trafficdirection.Ingress, nil
case "egress":
return trafficdirection.Egress, nil
default:
return trafficdirection.Invalid, fmt.Errorf("invalid direction %q provided", td)
}
} | go | func parseTrafficString(td string) (trafficdirection.TrafficDirection, error) {
lowered := strings.ToLower(td)
switch lowered {
case "ingress":
return trafficdirection.Ingress, nil
case "egress":
return trafficdirection.Egress, nil
default:
return trafficdirection.Invalid, fmt.Errorf("invalid direction %q provided", td)
}
} | [
"func",
"parseTrafficString",
"(",
"td",
"string",
")",
"(",
"trafficdirection",
".",
"TrafficDirection",
",",
"error",
")",
"{",
"lowered",
":=",
"strings",
".",
"ToLower",
"(",
"td",
")",
"\n\n",
"switch",
"lowered",
"{",
"case",
"\"",
"\"",
":",
"return",
"trafficdirection",
".",
"Ingress",
",",
"nil",
"\n",
"case",
"\"",
"\"",
":",
"return",
"trafficdirection",
".",
"Egress",
",",
"nil",
"\n",
"default",
":",
"return",
"trafficdirection",
".",
"Invalid",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"td",
")",
"\n",
"}",
"\n\n",
"}"
] | // parseTrafficString converts the provided string to its corresponding
// TrafficDirection. If the string does not correspond to a valid TrafficDirection
// type, returns Invalid and a corresponding error. | [
"parseTrafficString",
"converts",
"the",
"provided",
"string",
"to",
"its",
"corresponding",
"TrafficDirection",
".",
"If",
"the",
"string",
"does",
"not",
"correspond",
"to",
"a",
"valid",
"TrafficDirection",
"type",
"returns",
"Invalid",
"and",
"a",
"corresponding",
"error",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/cilium/cmd/helpers.go#L221-L233 |
162,384 | cilium/cilium | cilium/cmd/helpers.go | updatePolicyKey | func updatePolicyKey(pa *PolicyUpdateArgs, add bool) {
// The map needs not to be transparently initialized here even if
// it's not present for some reason. Triggering map recreation with
// OpenOrCreate when some map attribute had changed would be much worse.
policyMap, err := policymap.Open(pa.path)
if err != nil {
Fatalf("Cannot open policymap %q : %s", pa.path, err)
}
for _, proto := range pa.protocols {
u8p := u8proto.U8proto(proto)
entry := fmt.Sprintf("%d %d/%s", pa.label, pa.port, u8p.String())
if add {
var proxyPort uint16
if err := policyMap.Allow(pa.label, pa.port, u8p, pa.trafficDirection, proxyPort); err != nil {
Fatalf("Cannot add policy key '%s': %s\n", entry, err)
}
} else {
if err := policyMap.Delete(pa.label, pa.port, u8p, pa.trafficDirection); err != nil {
Fatalf("Cannot delete policy key '%s': %s\n", entry, err)
}
}
}
} | go | func updatePolicyKey(pa *PolicyUpdateArgs, add bool) {
// The map needs not to be transparently initialized here even if
// it's not present for some reason. Triggering map recreation with
// OpenOrCreate when some map attribute had changed would be much worse.
policyMap, err := policymap.Open(pa.path)
if err != nil {
Fatalf("Cannot open policymap %q : %s", pa.path, err)
}
for _, proto := range pa.protocols {
u8p := u8proto.U8proto(proto)
entry := fmt.Sprintf("%d %d/%s", pa.label, pa.port, u8p.String())
if add {
var proxyPort uint16
if err := policyMap.Allow(pa.label, pa.port, u8p, pa.trafficDirection, proxyPort); err != nil {
Fatalf("Cannot add policy key '%s': %s\n", entry, err)
}
} else {
if err := policyMap.Delete(pa.label, pa.port, u8p, pa.trafficDirection); err != nil {
Fatalf("Cannot delete policy key '%s': %s\n", entry, err)
}
}
}
} | [
"func",
"updatePolicyKey",
"(",
"pa",
"*",
"PolicyUpdateArgs",
",",
"add",
"bool",
")",
"{",
"// The map needs not to be transparently initialized here even if",
"// it's not present for some reason. Triggering map recreation with",
"// OpenOrCreate when some map attribute had changed would be much worse.",
"policyMap",
",",
"err",
":=",
"policymap",
".",
"Open",
"(",
"pa",
".",
"path",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"Fatalf",
"(",
"\"",
"\"",
",",
"pa",
".",
"path",
",",
"err",
")",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"proto",
":=",
"range",
"pa",
".",
"protocols",
"{",
"u8p",
":=",
"u8proto",
".",
"U8proto",
"(",
"proto",
")",
"\n",
"entry",
":=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"pa",
".",
"label",
",",
"pa",
".",
"port",
",",
"u8p",
".",
"String",
"(",
")",
")",
"\n",
"if",
"add",
"{",
"var",
"proxyPort",
"uint16",
"\n",
"if",
"err",
":=",
"policyMap",
".",
"Allow",
"(",
"pa",
".",
"label",
",",
"pa",
".",
"port",
",",
"u8p",
",",
"pa",
".",
"trafficDirection",
",",
"proxyPort",
")",
";",
"err",
"!=",
"nil",
"{",
"Fatalf",
"(",
"\"",
"\\n",
"\"",
",",
"entry",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"if",
"err",
":=",
"policyMap",
".",
"Delete",
"(",
"pa",
".",
"label",
",",
"pa",
".",
"port",
",",
"u8p",
",",
"pa",
".",
"trafficDirection",
")",
";",
"err",
"!=",
"nil",
"{",
"Fatalf",
"(",
"\"",
"\\n",
"\"",
",",
"entry",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // updatePolicyKey updates an entry in the PolicyMap for the provided
// PolicyUpdateArgs argument.
// Adds the entry to the PolicyMap if add is true, otherwise the entry is
// deleted. | [
"updatePolicyKey",
"updates",
"an",
"entry",
"in",
"the",
"PolicyMap",
"for",
"the",
"provided",
"PolicyUpdateArgs",
"argument",
".",
"Adds",
"the",
"entry",
"to",
"the",
"PolicyMap",
"if",
"add",
"is",
"true",
"otherwise",
"the",
"entry",
"is",
"deleted",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/cilium/cmd/helpers.go#L327-L350 |
162,385 | cilium/cilium | cilium/cmd/helpers.go | dumpConfig | func dumpConfig(Opts map[string]string) {
opts := []string{}
for k := range Opts {
opts = append(opts, k)
}
sort.Strings(opts)
for _, k := range opts {
// XXX: Reuse the format function from *option.Library
value = Opts[k]
if enabled, err := option.NormalizeBool(value); err != nil {
// If it cannot be parsed as a bool, just format the value.
fmt.Printf("%-24s %s\n", k, color.Green(value))
} else if enabled == option.OptionDisabled {
fmt.Printf("%-24s %s\n", k, color.Red("Disabled"))
} else {
fmt.Printf("%-24s %s\n", k, color.Green("Enabled"))
}
}
} | go | func dumpConfig(Opts map[string]string) {
opts := []string{}
for k := range Opts {
opts = append(opts, k)
}
sort.Strings(opts)
for _, k := range opts {
// XXX: Reuse the format function from *option.Library
value = Opts[k]
if enabled, err := option.NormalizeBool(value); err != nil {
// If it cannot be parsed as a bool, just format the value.
fmt.Printf("%-24s %s\n", k, color.Green(value))
} else if enabled == option.OptionDisabled {
fmt.Printf("%-24s %s\n", k, color.Red("Disabled"))
} else {
fmt.Printf("%-24s %s\n", k, color.Green("Enabled"))
}
}
} | [
"func",
"dumpConfig",
"(",
"Opts",
"map",
"[",
"string",
"]",
"string",
")",
"{",
"opts",
":=",
"[",
"]",
"string",
"{",
"}",
"\n",
"for",
"k",
":=",
"range",
"Opts",
"{",
"opts",
"=",
"append",
"(",
"opts",
",",
"k",
")",
"\n",
"}",
"\n",
"sort",
".",
"Strings",
"(",
"opts",
")",
"\n\n",
"for",
"_",
",",
"k",
":=",
"range",
"opts",
"{",
"// XXX: Reuse the format function from *option.Library",
"value",
"=",
"Opts",
"[",
"k",
"]",
"\n",
"if",
"enabled",
",",
"err",
":=",
"option",
".",
"NormalizeBool",
"(",
"value",
")",
";",
"err",
"!=",
"nil",
"{",
"// If it cannot be parsed as a bool, just format the value.",
"fmt",
".",
"Printf",
"(",
"\"",
"\\n",
"\"",
",",
"k",
",",
"color",
".",
"Green",
"(",
"value",
")",
")",
"\n",
"}",
"else",
"if",
"enabled",
"==",
"option",
".",
"OptionDisabled",
"{",
"fmt",
".",
"Printf",
"(",
"\"",
"\\n",
"\"",
",",
"k",
",",
"color",
".",
"Red",
"(",
"\"",
"\"",
")",
")",
"\n",
"}",
"else",
"{",
"fmt",
".",
"Printf",
"(",
"\"",
"\\n",
"\"",
",",
"k",
",",
"color",
".",
"Green",
"(",
"\"",
"\"",
")",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // dumpConfig pretty prints boolean options | [
"dumpConfig",
"pretty",
"prints",
"boolean",
"options"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/cilium/cmd/helpers.go#L353-L372 |
162,386 | cilium/cilium | pkg/envoy/server.go | RemoveListener | func (s *XDSServer) RemoveListener(name string, wg *completion.WaitGroup) xds.AckingResourceMutatorRevertFunc {
log.Debugf("Envoy: removeListener %s", name)
var listenerRevertFunc func(*completion.Completion)
s.mutex.Lock()
listener, ok := s.listeners[name]
if ok && listener != nil {
listener.count--
if listener.count == 0 {
delete(s.listeners, name)
listenerRevertFunc = s.listenerMutator.Delete(ListenerTypeURL, name, []string{"127.0.0.1"}, wg.AddCompletion())
}
} else {
// Bail out if this listener does not exist
log.Fatalf("Envoy: Attempt to remove non-existent listener: %s", name)
}
s.mutex.Unlock()
return func(completion *completion.Completion) {
s.mutex.Lock()
if listenerRevertFunc != nil {
listenerRevertFunc(completion)
}
listener.count++
s.listeners[name] = listener
s.mutex.Unlock()
}
} | go | func (s *XDSServer) RemoveListener(name string, wg *completion.WaitGroup) xds.AckingResourceMutatorRevertFunc {
log.Debugf("Envoy: removeListener %s", name)
var listenerRevertFunc func(*completion.Completion)
s.mutex.Lock()
listener, ok := s.listeners[name]
if ok && listener != nil {
listener.count--
if listener.count == 0 {
delete(s.listeners, name)
listenerRevertFunc = s.listenerMutator.Delete(ListenerTypeURL, name, []string{"127.0.0.1"}, wg.AddCompletion())
}
} else {
// Bail out if this listener does not exist
log.Fatalf("Envoy: Attempt to remove non-existent listener: %s", name)
}
s.mutex.Unlock()
return func(completion *completion.Completion) {
s.mutex.Lock()
if listenerRevertFunc != nil {
listenerRevertFunc(completion)
}
listener.count++
s.listeners[name] = listener
s.mutex.Unlock()
}
} | [
"func",
"(",
"s",
"*",
"XDSServer",
")",
"RemoveListener",
"(",
"name",
"string",
",",
"wg",
"*",
"completion",
".",
"WaitGroup",
")",
"xds",
".",
"AckingResourceMutatorRevertFunc",
"{",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"name",
")",
"\n\n",
"var",
"listenerRevertFunc",
"func",
"(",
"*",
"completion",
".",
"Completion",
")",
"\n\n",
"s",
".",
"mutex",
".",
"Lock",
"(",
")",
"\n",
"listener",
",",
"ok",
":=",
"s",
".",
"listeners",
"[",
"name",
"]",
"\n",
"if",
"ok",
"&&",
"listener",
"!=",
"nil",
"{",
"listener",
".",
"count",
"--",
"\n",
"if",
"listener",
".",
"count",
"==",
"0",
"{",
"delete",
"(",
"s",
".",
"listeners",
",",
"name",
")",
"\n",
"listenerRevertFunc",
"=",
"s",
".",
"listenerMutator",
".",
"Delete",
"(",
"ListenerTypeURL",
",",
"name",
",",
"[",
"]",
"string",
"{",
"\"",
"\"",
"}",
",",
"wg",
".",
"AddCompletion",
"(",
")",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"// Bail out if this listener does not exist",
"log",
".",
"Fatalf",
"(",
"\"",
"\"",
",",
"name",
")",
"\n",
"}",
"\n",
"s",
".",
"mutex",
".",
"Unlock",
"(",
")",
"\n\n",
"return",
"func",
"(",
"completion",
"*",
"completion",
".",
"Completion",
")",
"{",
"s",
".",
"mutex",
".",
"Lock",
"(",
")",
"\n",
"if",
"listenerRevertFunc",
"!=",
"nil",
"{",
"listenerRevertFunc",
"(",
"completion",
")",
"\n",
"}",
"\n",
"listener",
".",
"count",
"++",
"\n",
"s",
".",
"listeners",
"[",
"name",
"]",
"=",
"listener",
"\n",
"s",
".",
"mutex",
".",
"Unlock",
"(",
")",
"\n",
"}",
"\n",
"}"
] | // RemoveListener removes an existing Envoy Listener. | [
"RemoveListener",
"removes",
"an",
"existing",
"Envoy",
"Listener",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/envoy/server.go#L404-L432 |
162,387 | cilium/cilium | pkg/envoy/server.go | getNetworkPolicy | func getNetworkPolicy(name string, id identity.NumericIdentity, conntrackName string, policy *policy.L4Policy,
ingressPolicyEnforced, egressPolicyEnforced bool, labelsMap,
deniedIngressIdentities, deniedEgressIdentities cache.IdentityCache) *cilium.NetworkPolicy {
p := &cilium.NetworkPolicy{
Name: name,
Policy: uint64(id),
ConntrackMapName: conntrackName,
}
// If no policy, deny all traffic. Otherwise, convert the policies for ingress and egress.
if policy != nil {
p.IngressPerPortPolicies = getDirectionNetworkPolicy(policy.Ingress, ingressPolicyEnforced, labelsMap, deniedIngressIdentities)
p.EgressPerPortPolicies = getDirectionNetworkPolicy(policy.Egress, egressPolicyEnforced, labelsMap, deniedEgressIdentities)
}
return p
} | go | func getNetworkPolicy(name string, id identity.NumericIdentity, conntrackName string, policy *policy.L4Policy,
ingressPolicyEnforced, egressPolicyEnforced bool, labelsMap,
deniedIngressIdentities, deniedEgressIdentities cache.IdentityCache) *cilium.NetworkPolicy {
p := &cilium.NetworkPolicy{
Name: name,
Policy: uint64(id),
ConntrackMapName: conntrackName,
}
// If no policy, deny all traffic. Otherwise, convert the policies for ingress and egress.
if policy != nil {
p.IngressPerPortPolicies = getDirectionNetworkPolicy(policy.Ingress, ingressPolicyEnforced, labelsMap, deniedIngressIdentities)
p.EgressPerPortPolicies = getDirectionNetworkPolicy(policy.Egress, egressPolicyEnforced, labelsMap, deniedEgressIdentities)
}
return p
} | [
"func",
"getNetworkPolicy",
"(",
"name",
"string",
",",
"id",
"identity",
".",
"NumericIdentity",
",",
"conntrackName",
"string",
",",
"policy",
"*",
"policy",
".",
"L4Policy",
",",
"ingressPolicyEnforced",
",",
"egressPolicyEnforced",
"bool",
",",
"labelsMap",
",",
"deniedIngressIdentities",
",",
"deniedEgressIdentities",
"cache",
".",
"IdentityCache",
")",
"*",
"cilium",
".",
"NetworkPolicy",
"{",
"p",
":=",
"&",
"cilium",
".",
"NetworkPolicy",
"{",
"Name",
":",
"name",
",",
"Policy",
":",
"uint64",
"(",
"id",
")",
",",
"ConntrackMapName",
":",
"conntrackName",
",",
"}",
"\n\n",
"// If no policy, deny all traffic. Otherwise, convert the policies for ingress and egress.",
"if",
"policy",
"!=",
"nil",
"{",
"p",
".",
"IngressPerPortPolicies",
"=",
"getDirectionNetworkPolicy",
"(",
"policy",
".",
"Ingress",
",",
"ingressPolicyEnforced",
",",
"labelsMap",
",",
"deniedIngressIdentities",
")",
"\n",
"p",
".",
"EgressPerPortPolicies",
"=",
"getDirectionNetworkPolicy",
"(",
"policy",
".",
"Egress",
",",
"egressPolicyEnforced",
",",
"labelsMap",
",",
"deniedEgressIdentities",
")",
"\n",
"}",
"\n\n",
"return",
"p",
"\n",
"}"
] | // getNetworkPolicy converts a network policy into a cilium.NetworkPolicy. | [
"getNetworkPolicy",
"converts",
"a",
"network",
"policy",
"into",
"a",
"cilium",
".",
"NetworkPolicy",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/envoy/server.go#L728-L744 |
162,388 | cilium/cilium | pkg/envoy/server.go | RemoveNetworkPolicy | func (s *XDSServer) RemoveNetworkPolicy(ep logger.EndpointInfoSource) {
s.mutex.Lock()
defer s.mutex.Unlock()
if ep.GetIPv6Address() != "" {
name := ep.GetIPv6Address()
s.networkPolicyCache.Delete(NetworkPolicyTypeURL, name, false)
delete(s.networkPolicyEndpoints, name)
}
if ep.GetIPv4Address() != "" {
name := ep.GetIPv4Address()
s.networkPolicyCache.Delete(NetworkPolicyTypeURL, name, false)
delete(s.networkPolicyEndpoints, name)
}
} | go | func (s *XDSServer) RemoveNetworkPolicy(ep logger.EndpointInfoSource) {
s.mutex.Lock()
defer s.mutex.Unlock()
if ep.GetIPv6Address() != "" {
name := ep.GetIPv6Address()
s.networkPolicyCache.Delete(NetworkPolicyTypeURL, name, false)
delete(s.networkPolicyEndpoints, name)
}
if ep.GetIPv4Address() != "" {
name := ep.GetIPv4Address()
s.networkPolicyCache.Delete(NetworkPolicyTypeURL, name, false)
delete(s.networkPolicyEndpoints, name)
}
} | [
"func",
"(",
"s",
"*",
"XDSServer",
")",
"RemoveNetworkPolicy",
"(",
"ep",
"logger",
".",
"EndpointInfoSource",
")",
"{",
"s",
".",
"mutex",
".",
"Lock",
"(",
")",
"\n",
"defer",
"s",
".",
"mutex",
".",
"Unlock",
"(",
")",
"\n\n",
"if",
"ep",
".",
"GetIPv6Address",
"(",
")",
"!=",
"\"",
"\"",
"{",
"name",
":=",
"ep",
".",
"GetIPv6Address",
"(",
")",
"\n",
"s",
".",
"networkPolicyCache",
".",
"Delete",
"(",
"NetworkPolicyTypeURL",
",",
"name",
",",
"false",
")",
"\n",
"delete",
"(",
"s",
".",
"networkPolicyEndpoints",
",",
"name",
")",
"\n",
"}",
"\n",
"if",
"ep",
".",
"GetIPv4Address",
"(",
")",
"!=",
"\"",
"\"",
"{",
"name",
":=",
"ep",
".",
"GetIPv4Address",
"(",
")",
"\n",
"s",
".",
"networkPolicyCache",
".",
"Delete",
"(",
"NetworkPolicyTypeURL",
",",
"name",
",",
"false",
")",
"\n",
"delete",
"(",
"s",
".",
"networkPolicyEndpoints",
",",
"name",
")",
"\n",
"}",
"\n",
"}"
] | // RemoveNetworkPolicy removes network policies relevant to the specified
// endpoint from the set published to L7 proxies, and stops listening for
// acks for policies on this endpoint. | [
"RemoveNetworkPolicy",
"removes",
"network",
"policies",
"relevant",
"to",
"the",
"specified",
"endpoint",
"from",
"the",
"set",
"published",
"to",
"L7",
"proxies",
"and",
"stops",
"listening",
"for",
"acks",
"for",
"policies",
"on",
"this",
"endpoint",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/envoy/server.go#L874-L888 |
162,389 | cilium/cilium | pkg/envoy/server.go | GetNetworkPolicies | func (s *XDSServer) GetNetworkPolicies(resourceNames []string) (map[string]*cilium.NetworkPolicy, error) {
resources, err := s.networkPolicyCache.GetResources(context.Background(), NetworkPolicyTypeURL, 0, nil, resourceNames)
if err != nil {
return nil, err
}
networkPolicies := make(map[string]*cilium.NetworkPolicy, len(resources.Resources))
for _, res := range resources.Resources {
networkPolicy := res.(*cilium.NetworkPolicy)
networkPolicies[networkPolicy.Name] = networkPolicy
}
return networkPolicies, nil
} | go | func (s *XDSServer) GetNetworkPolicies(resourceNames []string) (map[string]*cilium.NetworkPolicy, error) {
resources, err := s.networkPolicyCache.GetResources(context.Background(), NetworkPolicyTypeURL, 0, nil, resourceNames)
if err != nil {
return nil, err
}
networkPolicies := make(map[string]*cilium.NetworkPolicy, len(resources.Resources))
for _, res := range resources.Resources {
networkPolicy := res.(*cilium.NetworkPolicy)
networkPolicies[networkPolicy.Name] = networkPolicy
}
return networkPolicies, nil
} | [
"func",
"(",
"s",
"*",
"XDSServer",
")",
"GetNetworkPolicies",
"(",
"resourceNames",
"[",
"]",
"string",
")",
"(",
"map",
"[",
"string",
"]",
"*",
"cilium",
".",
"NetworkPolicy",
",",
"error",
")",
"{",
"resources",
",",
"err",
":=",
"s",
".",
"networkPolicyCache",
".",
"GetResources",
"(",
"context",
".",
"Background",
"(",
")",
",",
"NetworkPolicyTypeURL",
",",
"0",
",",
"nil",
",",
"resourceNames",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"networkPolicies",
":=",
"make",
"(",
"map",
"[",
"string",
"]",
"*",
"cilium",
".",
"NetworkPolicy",
",",
"len",
"(",
"resources",
".",
"Resources",
")",
")",
"\n",
"for",
"_",
",",
"res",
":=",
"range",
"resources",
".",
"Resources",
"{",
"networkPolicy",
":=",
"res",
".",
"(",
"*",
"cilium",
".",
"NetworkPolicy",
")",
"\n",
"networkPolicies",
"[",
"networkPolicy",
".",
"Name",
"]",
"=",
"networkPolicy",
"\n",
"}",
"\n",
"return",
"networkPolicies",
",",
"nil",
"\n",
"}"
] | // GetNetworkPolicies returns the current version of the network policies with
// the given names.
// If resourceNames is empty, all resources are returned. | [
"GetNetworkPolicies",
"returns",
"the",
"current",
"version",
"of",
"the",
"network",
"policies",
"with",
"the",
"given",
"names",
".",
"If",
"resourceNames",
"is",
"empty",
"all",
"resources",
"are",
"returned",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/envoy/server.go#L899-L910 |
162,390 | cilium/cilium | pkg/envoy/server.go | getLocalEndpoint | func (s *XDSServer) getLocalEndpoint(networkPolicyName string) logger.EndpointUpdater {
s.mutex.RLock()
defer s.mutex.RUnlock()
return s.networkPolicyEndpoints[networkPolicyName]
} | go | func (s *XDSServer) getLocalEndpoint(networkPolicyName string) logger.EndpointUpdater {
s.mutex.RLock()
defer s.mutex.RUnlock()
return s.networkPolicyEndpoints[networkPolicyName]
} | [
"func",
"(",
"s",
"*",
"XDSServer",
")",
"getLocalEndpoint",
"(",
"networkPolicyName",
"string",
")",
"logger",
".",
"EndpointUpdater",
"{",
"s",
".",
"mutex",
".",
"RLock",
"(",
")",
"\n",
"defer",
"s",
".",
"mutex",
".",
"RUnlock",
"(",
")",
"\n\n",
"return",
"s",
".",
"networkPolicyEndpoints",
"[",
"networkPolicyName",
"]",
"\n",
"}"
] | // getLocalEndpoint returns the endpoint info for the local endpoint on which
// the network policy of the given name if enforced, or nil if not found. | [
"getLocalEndpoint",
"returns",
"the",
"endpoint",
"info",
"for",
"the",
"local",
"endpoint",
"on",
"which",
"the",
"network",
"policy",
"of",
"the",
"given",
"name",
"if",
"enforced",
"or",
"nil",
"if",
"not",
"found",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/envoy/server.go#L914-L919 |
162,391 | cilium/cilium | pkg/policy/api/utils.go | Equal | func (h *PortRuleHTTP) Equal(o PortRuleHTTP) bool {
if h.Path != o.Path ||
h.Method != o.Method ||
h.Host != o.Host ||
len(h.Headers) != len(o.Headers) {
return false
}
for i, value := range h.Headers {
if o.Headers[i] != value {
return false
}
}
return true
} | go | func (h *PortRuleHTTP) Equal(o PortRuleHTTP) bool {
if h.Path != o.Path ||
h.Method != o.Method ||
h.Host != o.Host ||
len(h.Headers) != len(o.Headers) {
return false
}
for i, value := range h.Headers {
if o.Headers[i] != value {
return false
}
}
return true
} | [
"func",
"(",
"h",
"*",
"PortRuleHTTP",
")",
"Equal",
"(",
"o",
"PortRuleHTTP",
")",
"bool",
"{",
"if",
"h",
".",
"Path",
"!=",
"o",
".",
"Path",
"||",
"h",
".",
"Method",
"!=",
"o",
".",
"Method",
"||",
"h",
".",
"Host",
"!=",
"o",
".",
"Host",
"||",
"len",
"(",
"h",
".",
"Headers",
")",
"!=",
"len",
"(",
"o",
".",
"Headers",
")",
"{",
"return",
"false",
"\n",
"}",
"\n\n",
"for",
"i",
",",
"value",
":=",
"range",
"h",
".",
"Headers",
"{",
"if",
"o",
".",
"Headers",
"[",
"i",
"]",
"!=",
"value",
"{",
"return",
"false",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"true",
"\n",
"}"
] | // Equal returns true if both HTTP rules are equal | [
"Equal",
"returns",
"true",
"if",
"both",
"HTTP",
"rules",
"are",
"equal"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/utils.go#L34-L48 |
162,392 | cilium/cilium | pkg/policy/api/utils.go | Exists | func (d *PortRuleDNS) Exists(rules L7Rules) bool {
for _, existingRule := range rules.DNS {
if d.Equal(existingRule) {
return true
}
}
return false
} | go | func (d *PortRuleDNS) Exists(rules L7Rules) bool {
for _, existingRule := range rules.DNS {
if d.Equal(existingRule) {
return true
}
}
return false
} | [
"func",
"(",
"d",
"*",
"PortRuleDNS",
")",
"Exists",
"(",
"rules",
"L7Rules",
")",
"bool",
"{",
"for",
"_",
",",
"existingRule",
":=",
"range",
"rules",
".",
"DNS",
"{",
"if",
"d",
".",
"Equal",
"(",
"existingRule",
")",
"{",
"return",
"true",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"false",
"\n",
"}"
] | // Exists returns true if the DNS rule already exists in the list of rules | [
"Exists",
"returns",
"true",
"if",
"the",
"DNS",
"rule",
"already",
"exists",
"in",
"the",
"list",
"of",
"rules"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/utils.go#L62-L70 |
162,393 | cilium/cilium | pkg/policy/api/utils.go | Exists | func (h *PortRuleL7) Exists(rules L7Rules) bool {
for _, existingRule := range rules.L7 {
if h.Equal(existingRule) {
return true
}
}
return false
} | go | func (h *PortRuleL7) Exists(rules L7Rules) bool {
for _, existingRule := range rules.L7 {
if h.Equal(existingRule) {
return true
}
}
return false
} | [
"func",
"(",
"h",
"*",
"PortRuleL7",
")",
"Exists",
"(",
"rules",
"L7Rules",
")",
"bool",
"{",
"for",
"_",
",",
"existingRule",
":=",
"range",
"rules",
".",
"L7",
"{",
"if",
"h",
".",
"Equal",
"(",
"existingRule",
")",
"{",
"return",
"true",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"false",
"\n",
"}"
] | // Exists returns true if the L7 rule already exists in the list of rules | [
"Exists",
"returns",
"true",
"if",
"the",
"L7",
"rule",
"already",
"exists",
"in",
"the",
"list",
"of",
"rules"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/utils.go#L79-L87 |
162,394 | cilium/cilium | pkg/policy/api/utils.go | Equal | func (h *PortRuleL7) Equal(o PortRuleL7) bool {
if len(*h) != len(o) {
return false
}
for k, v := range *h {
if v2, ok := o[k]; !ok || v2 != v {
return false
}
}
return true
} | go | func (h *PortRuleL7) Equal(o PortRuleL7) bool {
if len(*h) != len(o) {
return false
}
for k, v := range *h {
if v2, ok := o[k]; !ok || v2 != v {
return false
}
}
return true
} | [
"func",
"(",
"h",
"*",
"PortRuleL7",
")",
"Equal",
"(",
"o",
"PortRuleL7",
")",
"bool",
"{",
"if",
"len",
"(",
"*",
"h",
")",
"!=",
"len",
"(",
"o",
")",
"{",
"return",
"false",
"\n",
"}",
"\n",
"for",
"k",
",",
"v",
":=",
"range",
"*",
"h",
"{",
"if",
"v2",
",",
"ok",
":=",
"o",
"[",
"k",
"]",
";",
"!",
"ok",
"||",
"v2",
"!=",
"v",
"{",
"return",
"false",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"true",
"\n",
"}"
] | // Equal returns true if both L7 rules are equal | [
"Equal",
"returns",
"true",
"if",
"both",
"L7",
"rules",
"are",
"equal"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/utils.go#L95-L105 |
162,395 | cilium/cilium | pkg/policy/api/utils.go | Validate | func (l4 L4Proto) Validate() error {
switch l4 {
case ProtoAny, ProtoTCP, ProtoUDP:
default:
return fmt.Errorf("invalid protocol %q, must be { tcp | udp | any }", l4)
}
return nil
} | go | func (l4 L4Proto) Validate() error {
switch l4 {
case ProtoAny, ProtoTCP, ProtoUDP:
default:
return fmt.Errorf("invalid protocol %q, must be { tcp | udp | any }", l4)
}
return nil
} | [
"func",
"(",
"l4",
"L4Proto",
")",
"Validate",
"(",
")",
"error",
"{",
"switch",
"l4",
"{",
"case",
"ProtoAny",
",",
"ProtoTCP",
",",
"ProtoUDP",
":",
"default",
":",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"l4",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Validate returns an error if the layer 4 protocol is not valid | [
"Validate",
"returns",
"an",
"error",
"if",
"the",
"layer",
"4",
"protocol",
"is",
"not",
"valid"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/utils.go#L108-L116 |
162,396 | cilium/cilium | pkg/policy/api/utils.go | ParseL4Proto | func ParseL4Proto(proto string) (L4Proto, error) {
if proto == "" {
return ProtoAny, nil
}
p := L4Proto(strings.ToUpper(proto))
return p, p.Validate()
} | go | func ParseL4Proto(proto string) (L4Proto, error) {
if proto == "" {
return ProtoAny, nil
}
p := L4Proto(strings.ToUpper(proto))
return p, p.Validate()
} | [
"func",
"ParseL4Proto",
"(",
"proto",
"string",
")",
"(",
"L4Proto",
",",
"error",
")",
"{",
"if",
"proto",
"==",
"\"",
"\"",
"{",
"return",
"ProtoAny",
",",
"nil",
"\n",
"}",
"\n\n",
"p",
":=",
"L4Proto",
"(",
"strings",
".",
"ToUpper",
"(",
"proto",
")",
")",
"\n",
"return",
"p",
",",
"p",
".",
"Validate",
"(",
")",
"\n",
"}"
] | // ParseL4Proto parses a string as layer 4 protocol | [
"ParseL4Proto",
"parses",
"a",
"string",
"as",
"layer",
"4",
"protocol"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/utils.go#L119-L126 |
162,397 | cilium/cilium | pkg/datapath/maps/map.go | removeDatapathMapping | func (gw *realEPManager) removeDatapathMapping(endpointID uint16) error {
return policymap.RemoveGlobalMapping(uint32(endpointID))
} | go | func (gw *realEPManager) removeDatapathMapping(endpointID uint16) error {
return policymap.RemoveGlobalMapping(uint32(endpointID))
} | [
"func",
"(",
"gw",
"*",
"realEPManager",
")",
"removeDatapathMapping",
"(",
"endpointID",
"uint16",
")",
"error",
"{",
"return",
"policymap",
".",
"RemoveGlobalMapping",
"(",
"uint32",
"(",
"endpointID",
")",
")",
"\n",
"}"
] | // removeDatapathMapping unlinks the endpointID from the global policy map, preventing
// packets that arrive on this node from being forwarded to the endpoint that
// used to exist with the specified ID. | [
"removeDatapathMapping",
"unlinks",
"the",
"endpointID",
"from",
"the",
"global",
"policy",
"map",
"preventing",
"packets",
"that",
"arrive",
"on",
"this",
"node",
"from",
"being",
"forwarded",
"to",
"the",
"endpoint",
"that",
"used",
"to",
"exist",
"with",
"the",
"specified",
"ID",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/maps/map.go#L68-L70 |
162,398 | cilium/cilium | pkg/datapath/maps/map.go | removeMapPath | func (gw *realEPManager) removeMapPath(path string) {
if err := os.RemoveAll(path); err != nil {
log.WithError(err).WithField(logfields.Path, path).Warn("Error while deleting stale map file")
} else {
log.WithField(logfields.Path, path).Info("Removed stale bpf map")
}
} | go | func (gw *realEPManager) removeMapPath(path string) {
if err := os.RemoveAll(path); err != nil {
log.WithError(err).WithField(logfields.Path, path).Warn("Error while deleting stale map file")
} else {
log.WithField(logfields.Path, path).Info("Removed stale bpf map")
}
} | [
"func",
"(",
"gw",
"*",
"realEPManager",
")",
"removeMapPath",
"(",
"path",
"string",
")",
"{",
"if",
"err",
":=",
"os",
".",
"RemoveAll",
"(",
"path",
")",
";",
"err",
"!=",
"nil",
"{",
"log",
".",
"WithError",
"(",
"err",
")",
".",
"WithField",
"(",
"logfields",
".",
"Path",
",",
"path",
")",
".",
"Warn",
"(",
"\"",
"\"",
")",
"\n",
"}",
"else",
"{",
"log",
".",
"WithField",
"(",
"logfields",
".",
"Path",
",",
"path",
")",
".",
"Info",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}"
] | // removeMapPath removes the specified path from the filesystem. | [
"removeMapPath",
"removes",
"the",
"specified",
"path",
"from",
"the",
"filesystem",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/maps/map.go#L73-L79 |
162,399 | cilium/cilium | pkg/datapath/maps/map.go | deleteMapIfStale | func (ms *mapSweeper) deleteMapIfStale(path string, filename string, endpointID string) {
if tmp, err := strconv.ParseUint(endpointID, 10, 16); err == nil {
epID := uint16(tmp)
if ms.endpointExists(epID) {
prefix := strings.TrimSuffix(filename, endpointID)
if filename != bpf.LocalMapName(prefix, epID) {
ms.removeMapPath(path)
}
} else {
err2 := ms.removeDatapathMapping(epID)
if err2 != nil {
log.WithError(err2).Debugf("Failed to remove ID %d from global policy map", tmp)
}
ms.removeMapPath(path)
}
}
} | go | func (ms *mapSweeper) deleteMapIfStale(path string, filename string, endpointID string) {
if tmp, err := strconv.ParseUint(endpointID, 10, 16); err == nil {
epID := uint16(tmp)
if ms.endpointExists(epID) {
prefix := strings.TrimSuffix(filename, endpointID)
if filename != bpf.LocalMapName(prefix, epID) {
ms.removeMapPath(path)
}
} else {
err2 := ms.removeDatapathMapping(epID)
if err2 != nil {
log.WithError(err2).Debugf("Failed to remove ID %d from global policy map", tmp)
}
ms.removeMapPath(path)
}
}
} | [
"func",
"(",
"ms",
"*",
"mapSweeper",
")",
"deleteMapIfStale",
"(",
"path",
"string",
",",
"filename",
"string",
",",
"endpointID",
"string",
")",
"{",
"if",
"tmp",
",",
"err",
":=",
"strconv",
".",
"ParseUint",
"(",
"endpointID",
",",
"10",
",",
"16",
")",
";",
"err",
"==",
"nil",
"{",
"epID",
":=",
"uint16",
"(",
"tmp",
")",
"\n",
"if",
"ms",
".",
"endpointExists",
"(",
"epID",
")",
"{",
"prefix",
":=",
"strings",
".",
"TrimSuffix",
"(",
"filename",
",",
"endpointID",
")",
"\n",
"if",
"filename",
"!=",
"bpf",
".",
"LocalMapName",
"(",
"prefix",
",",
"epID",
")",
"{",
"ms",
".",
"removeMapPath",
"(",
"path",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"err2",
":=",
"ms",
".",
"removeDatapathMapping",
"(",
"epID",
")",
"\n",
"if",
"err2",
"!=",
"nil",
"{",
"log",
".",
"WithError",
"(",
"err2",
")",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"tmp",
")",
"\n",
"}",
"\n",
"ms",
".",
"removeMapPath",
"(",
"path",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // deleteMapIfStale uses the endpointManager implementation to determine for
// the given path whether it should be deleted, and if so deletes the path. | [
"deleteMapIfStale",
"uses",
"the",
"endpointManager",
"implementation",
"to",
"determine",
"for",
"the",
"given",
"path",
"whether",
"it",
"should",
"be",
"deleted",
"and",
"if",
"so",
"deletes",
"the",
"path",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/maps/map.go#L98-L114 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.