id
int32
0
167k
repo
stringlengths
5
54
path
stringlengths
4
155
func_name
stringlengths
1
118
original_string
stringlengths
52
85.5k
language
stringclasses
1 value
code
stringlengths
52
85.5k
code_tokens
sequencelengths
21
1.41k
docstring
stringlengths
6
2.61k
docstring_tokens
sequencelengths
3
215
sha
stringlengths
40
40
url
stringlengths
85
252
162,600
cilium/cilium
pkg/ip/cidr.go
ParseCIDRs
func ParseCIDRs(cidrs []string) (valid []*net.IPNet, invalid []string) { valid = make([]*net.IPNet, 0, len(cidrs)) invalid = make([]string, 0, len(cidrs)) for _, cidr := range cidrs { _, prefix, err := net.ParseCIDR(cidr) if err != nil { // Likely the CIDR is specified in host format. ip := net.ParseIP(cidr) if ip == nil { invalid = append(invalid, cidr) continue } else { bits := net.IPv6len * 8 if ip.To4() != nil { ip = ip.To4() bits = net.IPv4len * 8 } prefix = &net.IPNet{ IP: ip, Mask: net.CIDRMask(bits, bits), } } } if prefix != nil { valid = append(valid, prefix) } } return valid, invalid }
go
func ParseCIDRs(cidrs []string) (valid []*net.IPNet, invalid []string) { valid = make([]*net.IPNet, 0, len(cidrs)) invalid = make([]string, 0, len(cidrs)) for _, cidr := range cidrs { _, prefix, err := net.ParseCIDR(cidr) if err != nil { // Likely the CIDR is specified in host format. ip := net.ParseIP(cidr) if ip == nil { invalid = append(invalid, cidr) continue } else { bits := net.IPv6len * 8 if ip.To4() != nil { ip = ip.To4() bits = net.IPv4len * 8 } prefix = &net.IPNet{ IP: ip, Mask: net.CIDRMask(bits, bits), } } } if prefix != nil { valid = append(valid, prefix) } } return valid, invalid }
[ "func", "ParseCIDRs", "(", "cidrs", "[", "]", "string", ")", "(", "valid", "[", "]", "*", "net", ".", "IPNet", ",", "invalid", "[", "]", "string", ")", "{", "valid", "=", "make", "(", "[", "]", "*", "net", ".", "IPNet", ",", "0", ",", "len", "(", "cidrs", ")", ")", "\n", "invalid", "=", "make", "(", "[", "]", "string", ",", "0", ",", "len", "(", "cidrs", ")", ")", "\n", "for", "_", ",", "cidr", ":=", "range", "cidrs", "{", "_", ",", "prefix", ",", "err", ":=", "net", ".", "ParseCIDR", "(", "cidr", ")", "\n", "if", "err", "!=", "nil", "{", "// Likely the CIDR is specified in host format.", "ip", ":=", "net", ".", "ParseIP", "(", "cidr", ")", "\n", "if", "ip", "==", "nil", "{", "invalid", "=", "append", "(", "invalid", ",", "cidr", ")", "\n", "continue", "\n", "}", "else", "{", "bits", ":=", "net", ".", "IPv6len", "*", "8", "\n", "if", "ip", ".", "To4", "(", ")", "!=", "nil", "{", "ip", "=", "ip", ".", "To4", "(", ")", "\n", "bits", "=", "net", ".", "IPv4len", "*", "8", "\n", "}", "\n", "prefix", "=", "&", "net", ".", "IPNet", "{", "IP", ":", "ip", ",", "Mask", ":", "net", ".", "CIDRMask", "(", "bits", ",", "bits", ")", ",", "}", "\n", "}", "\n", "}", "\n", "if", "prefix", "!=", "nil", "{", "valid", "=", "append", "(", "valid", ",", "prefix", ")", "\n", "}", "\n", "}", "\n", "return", "valid", ",", "invalid", "\n", "}" ]
// ParseCIDRs fetches all CIDRs referred to by the specified slice and returns // them as regular golang CIDR objects.
[ "ParseCIDRs", "fetches", "all", "CIDRs", "referred", "to", "by", "the", "specified", "slice", "and", "returns", "them", "as", "regular", "golang", "CIDR", "objects", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/ip/cidr.go#L23-L51
162,601
cilium/cilium
pkg/kvstore/lock.go
Unlock
func (l *Lock) Unlock() error { if l == nil { return nil } // Unlock kvstore mutex first err := l.kvLock.Unlock() // unlock local lock even if kvstore cannot be unlocked kvstoreLocks.unlock(l.path, l.id) Trace("Unlocked", nil, logrus.Fields{fieldKey: l.path}) return err }
go
func (l *Lock) Unlock() error { if l == nil { return nil } // Unlock kvstore mutex first err := l.kvLock.Unlock() // unlock local lock even if kvstore cannot be unlocked kvstoreLocks.unlock(l.path, l.id) Trace("Unlocked", nil, logrus.Fields{fieldKey: l.path}) return err }
[ "func", "(", "l", "*", "Lock", ")", "Unlock", "(", ")", "error", "{", "if", "l", "==", "nil", "{", "return", "nil", "\n", "}", "\n\n", "// Unlock kvstore mutex first", "err", ":=", "l", ".", "kvLock", ".", "Unlock", "(", ")", "\n\n", "// unlock local lock even if kvstore cannot be unlocked", "kvstoreLocks", ".", "unlock", "(", "l", ".", "path", ",", "l", ".", "id", ")", "\n", "Trace", "(", "\"", "\"", ",", "nil", ",", "logrus", ".", "Fields", "{", "fieldKey", ":", "l", ".", "path", "}", ")", "\n\n", "return", "err", "\n", "}" ]
// Unlock unlocks a lock
[ "Unlock", "unlocks", "a", "lock" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/kvstore/lock.go#L131-L144
162,602
cilium/cilium
api/v1/models/endpoint_policy_status.go
Validate
func (m *EndpointPolicyStatus) Validate(formats strfmt.Registry) error { var res []error if err := m.validateProxyStatistics(formats); err != nil { res = append(res, err) } if err := m.validateRealized(formats); err != nil { res = append(res, err) } if err := m.validateSpec(formats); err != nil { res = append(res, err) } if len(res) > 0 { return errors.CompositeValidationError(res...) } return nil }
go
func (m *EndpointPolicyStatus) Validate(formats strfmt.Registry) error { var res []error if err := m.validateProxyStatistics(formats); err != nil { res = append(res, err) } if err := m.validateRealized(formats); err != nil { res = append(res, err) } if err := m.validateSpec(formats); err != nil { res = append(res, err) } if len(res) > 0 { return errors.CompositeValidationError(res...) } return nil }
[ "func", "(", "m", "*", "EndpointPolicyStatus", ")", "Validate", "(", "formats", "strfmt", ".", "Registry", ")", "error", "{", "var", "res", "[", "]", "error", "\n\n", "if", "err", ":=", "m", ".", "validateProxyStatistics", "(", "formats", ")", ";", "err", "!=", "nil", "{", "res", "=", "append", "(", "res", ",", "err", ")", "\n", "}", "\n\n", "if", "err", ":=", "m", ".", "validateRealized", "(", "formats", ")", ";", "err", "!=", "nil", "{", "res", "=", "append", "(", "res", ",", "err", ")", "\n", "}", "\n\n", "if", "err", ":=", "m", ".", "validateSpec", "(", "formats", ")", ";", "err", "!=", "nil", "{", "res", "=", "append", "(", "res", ",", "err", ")", "\n", "}", "\n\n", "if", "len", "(", "res", ")", ">", "0", "{", "return", "errors", ".", "CompositeValidationError", "(", "res", "...", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Validate validates this endpoint policy status
[ "Validate", "validates", "this", "endpoint", "policy", "status" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/models/endpoint_policy_status.go#L35-L54
162,603
cilium/cilium
pkg/maps/nat/nat.go
NatDumpCreated
func NatDumpCreated(dumpStart, entryCreated uint64) string { tsecCreated := entryCreated / 1000000000 tsecStart := dumpStart / 1000000000 return fmt.Sprintf("%dsec", tsecStart-tsecCreated) }
go
func NatDumpCreated(dumpStart, entryCreated uint64) string { tsecCreated := entryCreated / 1000000000 tsecStart := dumpStart / 1000000000 return fmt.Sprintf("%dsec", tsecStart-tsecCreated) }
[ "func", "NatDumpCreated", "(", "dumpStart", ",", "entryCreated", "uint64", ")", "string", "{", "tsecCreated", ":=", "entryCreated", "/", "1000000000", "\n", "tsecStart", ":=", "dumpStart", "/", "1000000000", "\n\n", "return", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "tsecStart", "-", "tsecCreated", ")", "\n", "}" ]
// NatDumpCreated returns time in seconds when NAT entry was created.
[ "NatDumpCreated", "returns", "time", "in", "seconds", "when", "NAT", "entry", "was", "created", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/nat/nat.go#L74-L79
162,604
cilium/cilium
pkg/maps/nat/nat.go
DumpEntries
func (m *Map) DumpEntries() (string, error) { var buffer bytes.Buffer nsecStart, _ := bpf.GetMtime() cb := func(k bpf.MapKey, v bpf.MapValue) { key := k.(tuple.TupleKey) if !key.ToHost().Dump(&buffer, false) { return } val := v.(NatEntry) buffer.WriteString(val.ToHost().Dump(key, nsecStart)) } err := m.DumpWithCallback(cb) return buffer.String(), err }
go
func (m *Map) DumpEntries() (string, error) { var buffer bytes.Buffer nsecStart, _ := bpf.GetMtime() cb := func(k bpf.MapKey, v bpf.MapValue) { key := k.(tuple.TupleKey) if !key.ToHost().Dump(&buffer, false) { return } val := v.(NatEntry) buffer.WriteString(val.ToHost().Dump(key, nsecStart)) } err := m.DumpWithCallback(cb) return buffer.String(), err }
[ "func", "(", "m", "*", "Map", ")", "DumpEntries", "(", ")", "(", "string", ",", "error", ")", "{", "var", "buffer", "bytes", ".", "Buffer", "\n\n", "nsecStart", ",", "_", ":=", "bpf", ".", "GetMtime", "(", ")", "\n", "cb", ":=", "func", "(", "k", "bpf", ".", "MapKey", ",", "v", "bpf", ".", "MapValue", ")", "{", "key", ":=", "k", ".", "(", "tuple", ".", "TupleKey", ")", "\n", "if", "!", "key", ".", "ToHost", "(", ")", ".", "Dump", "(", "&", "buffer", ",", "false", ")", "{", "return", "\n", "}", "\n", "val", ":=", "v", ".", "(", "NatEntry", ")", "\n", "buffer", ".", "WriteString", "(", "val", ".", "ToHost", "(", ")", ".", "Dump", "(", "key", ",", "nsecStart", ")", ")", "\n", "}", "\n", "err", ":=", "m", ".", "DumpWithCallback", "(", "cb", ")", "\n", "return", "buffer", ".", "String", "(", ")", ",", "err", "\n", "}" ]
// DumpEntries iterates through Map m and writes the values of the // nat entries in m to a string.
[ "DumpEntries", "iterates", "through", "Map", "m", "and", "writes", "the", "values", "of", "the", "nat", "entries", "in", "m", "to", "a", "string", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/nat/nat.go#L129-L143
162,605
cilium/cilium
pkg/maps/nat/nat.go
Flush
func (m *Map) Flush() int { if m.v4 { return int(doFlush4(m).deleted) } return int(doFlush6(m).deleted) }
go
func (m *Map) Flush() int { if m.v4 { return int(doFlush4(m).deleted) } return int(doFlush6(m).deleted) }
[ "func", "(", "m", "*", "Map", ")", "Flush", "(", ")", "int", "{", "if", "m", ".", "v4", "{", "return", "int", "(", "doFlush4", "(", "m", ")", ".", "deleted", ")", "\n", "}", "\n", "return", "int", "(", "doFlush6", "(", "m", ")", ".", "deleted", ")", "\n", "}" ]
// Flush deletes all NAT mappings from the given table.
[ "Flush", "deletes", "all", "NAT", "mappings", "from", "the", "given", "table", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/nat/nat.go#L192-L197
162,606
cilium/cilium
pkg/maps/nat/nat.go
DeleteMapping
func (m *Map) DeleteMapping(key tuple.TupleKey) error { if key.GetFlags()&tuple.TUPLE_F_IN != 0 { return nil } if m.v4 { return deleteMapping4(m, key.(*tuple.TupleKey4Global)) } return deleteMapping6(m, key.(*tuple.TupleKey6Global)) }
go
func (m *Map) DeleteMapping(key tuple.TupleKey) error { if key.GetFlags()&tuple.TUPLE_F_IN != 0 { return nil } if m.v4 { return deleteMapping4(m, key.(*tuple.TupleKey4Global)) } return deleteMapping6(m, key.(*tuple.TupleKey6Global)) }
[ "func", "(", "m", "*", "Map", ")", "DeleteMapping", "(", "key", "tuple", ".", "TupleKey", ")", "error", "{", "if", "key", ".", "GetFlags", "(", ")", "&", "tuple", ".", "TUPLE_F_IN", "!=", "0", "{", "return", "nil", "\n", "}", "\n", "if", "m", ".", "v4", "{", "return", "deleteMapping4", "(", "m", ",", "key", ".", "(", "*", "tuple", ".", "TupleKey4Global", ")", ")", "\n", "}", "\n", "return", "deleteMapping6", "(", "m", ",", "key", ".", "(", "*", "tuple", ".", "TupleKey6Global", ")", ")", "\n", "}" ]
// DeleteMapping removes a NAT mapping from the global NAT table.
[ "DeleteMapping", "removes", "a", "NAT", "mapping", "from", "the", "global", "NAT", "table", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/nat/nat.go#L244-L252
162,607
cilium/cilium
daemon/k8s_watcher.go
blockWaitGroupToSyncResources
func (d *Daemon) blockWaitGroupToSyncResources(stop <-chan struct{}, informer cache.Controller, resourceName string) { ch := make(chan struct{}) d.k8sResourceSyncedMu.Lock() d.k8sResourceSynced[resourceName] = ch d.k8sResourceSyncedMu.Unlock() go func() { scopedLog := log.WithField("kubernetesResource", resourceName) scopedLog.Debug("waiting for cache to synchronize") if ok := cache.WaitForCacheSync(stop, informer.HasSynced); !ok { select { case <-stop: scopedLog.Debug("canceled cache synchronization") // do not fatal if the channel was stopped default: // Fatally exit it resource fails to sync scopedLog.Fatalf("failed to wait for cache to sync") } } else { scopedLog.Debug("cache synced") } close(ch) }() }
go
func (d *Daemon) blockWaitGroupToSyncResources(stop <-chan struct{}, informer cache.Controller, resourceName string) { ch := make(chan struct{}) d.k8sResourceSyncedMu.Lock() d.k8sResourceSynced[resourceName] = ch d.k8sResourceSyncedMu.Unlock() go func() { scopedLog := log.WithField("kubernetesResource", resourceName) scopedLog.Debug("waiting for cache to synchronize") if ok := cache.WaitForCacheSync(stop, informer.HasSynced); !ok { select { case <-stop: scopedLog.Debug("canceled cache synchronization") // do not fatal if the channel was stopped default: // Fatally exit it resource fails to sync scopedLog.Fatalf("failed to wait for cache to sync") } } else { scopedLog.Debug("cache synced") } close(ch) }() }
[ "func", "(", "d", "*", "Daemon", ")", "blockWaitGroupToSyncResources", "(", "stop", "<-", "chan", "struct", "{", "}", ",", "informer", "cache", ".", "Controller", ",", "resourceName", "string", ")", "{", "ch", ":=", "make", "(", "chan", "struct", "{", "}", ")", "\n", "d", ".", "k8sResourceSyncedMu", ".", "Lock", "(", ")", "\n", "d", ".", "k8sResourceSynced", "[", "resourceName", "]", "=", "ch", "\n", "d", ".", "k8sResourceSyncedMu", ".", "Unlock", "(", ")", "\n", "go", "func", "(", ")", "{", "scopedLog", ":=", "log", ".", "WithField", "(", "\"", "\"", ",", "resourceName", ")", "\n", "scopedLog", ".", "Debug", "(", "\"", "\"", ")", "\n", "if", "ok", ":=", "cache", ".", "WaitForCacheSync", "(", "stop", ",", "informer", ".", "HasSynced", ")", ";", "!", "ok", "{", "select", "{", "case", "<-", "stop", ":", "scopedLog", ".", "Debug", "(", "\"", "\"", ")", "\n", "// do not fatal if the channel was stopped", "default", ":", "// Fatally exit it resource fails to sync", "scopedLog", ".", "Fatalf", "(", "\"", "\"", ")", "\n", "}", "\n", "}", "else", "{", "scopedLog", ".", "Debug", "(", "\"", "\"", ")", "\n", "}", "\n", "close", "(", "ch", ")", "\n", "}", "(", ")", "\n", "}" ]
// blockWaitGroupToSyncResources ensures that anything which waits on waitGroup // waits until all objects of the specified resource stored in Kubernetes are // received by the informer and processed by controller. // Fatally exits if syncing these initial objects fails. // If the given stop channel is closed, it does not fatal.
[ "blockWaitGroupToSyncResources", "ensures", "that", "anything", "which", "waits", "on", "waitGroup", "waits", "until", "all", "objects", "of", "the", "specified", "resource", "stored", "in", "Kubernetes", "are", "received", "by", "the", "informer", "and", "processed", "by", "controller", ".", "Fatally", "exits", "if", "syncing", "these", "initial", "objects", "fails", ".", "If", "the", "given", "stop", "channel", "is", "closed", "it", "does", "not", "fatal", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/daemon/k8s_watcher.go#L257-L279
162,608
cilium/cilium
daemon/k8s_watcher.go
waitForCacheSync
func (d *Daemon) waitForCacheSync(resourceNames ...string) { for _, resourceName := range resourceNames { d.k8sResourceSyncedMu.RLock() c, ok := d.k8sResourceSynced[resourceName] d.k8sResourceSyncedMu.RUnlock() if !ok { continue } <-c } }
go
func (d *Daemon) waitForCacheSync(resourceNames ...string) { for _, resourceName := range resourceNames { d.k8sResourceSyncedMu.RLock() c, ok := d.k8sResourceSynced[resourceName] d.k8sResourceSyncedMu.RUnlock() if !ok { continue } <-c } }
[ "func", "(", "d", "*", "Daemon", ")", "waitForCacheSync", "(", "resourceNames", "...", "string", ")", "{", "for", "_", ",", "resourceName", ":=", "range", "resourceNames", "{", "d", ".", "k8sResourceSyncedMu", ".", "RLock", "(", ")", "\n", "c", ",", "ok", ":=", "d", ".", "k8sResourceSynced", "[", "resourceName", "]", "\n", "d", ".", "k8sResourceSyncedMu", ".", "RUnlock", "(", ")", "\n", "if", "!", "ok", "{", "continue", "\n", "}", "\n", "<-", "c", "\n", "}", "\n", "}" ]
// waitForCacheSync waits for k8s caches to be synchronized for the given // resource. Returns once all resourcesNames are synchronized with cilium-agent.
[ "waitForCacheSync", "waits", "for", "k8s", "caches", "to", "be", "synchronized", "for", "the", "given", "resource", ".", "Returns", "once", "all", "resourcesNames", "are", "synchronized", "with", "cilium", "-", "agent", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/daemon/k8s_watcher.go#L283-L293
162,609
cilium/cilium
daemon/k8s_watcher.go
initK8sSubsystem
func (d *Daemon) initK8sSubsystem() <-chan struct{} { if err := d.EnableK8sWatcher(option.Config.K8sWatcherQueueSize); err != nil { log.WithError(err).Fatal("Unable to establish connection to Kubernetes apiserver") } cachesSynced := make(chan struct{}) go func() { log.Info("Waiting until all pre-existing resources related to policy have been received") // Wait only for certain caches, but not all! // We don't wait for nodes synchronization nor ingresses. d.waitForCacheSync( // To perform the service translation and have the BPF LB datapath // with the right service -> backend (k8s endpoints) translation. k8sAPIGroupServiceV1Core, // To perform the service translation and have the BPF LB datapath // with the right service -> backend (k8s endpoints) translation. k8sAPIGroupEndpointV1Core, // We need all network policies in place before restoring to make sure // we are enforcing the correct policies for each endpoint before // restarting. k8sAPIGroupCiliumV2, // We need all network policies in place before restoring to make sure // we are enforcing the correct policies for each endpoint before // restarting. k8sAPIGroupNetworkingV1Core, // Namespaces can contain labels which are essential for endpoints // being restored to have the right identity. k8sAPIGroupNamespaceV1Core, // Pods can contain labels which are essential for endpoints // being restored to have the right identity. k8sAPIGroupPodV1Core, ) close(cachesSynced) }() go func() { select { case <-cachesSynced: log.Info("All pre-existing resources related to policy have been received; continuing") case <-time.After(cacheSyncTimeout): log.Fatalf("Timed out waiting for pre-existing resources related to policy to be received; exiting") } }() return cachesSynced }
go
func (d *Daemon) initK8sSubsystem() <-chan struct{} { if err := d.EnableK8sWatcher(option.Config.K8sWatcherQueueSize); err != nil { log.WithError(err).Fatal("Unable to establish connection to Kubernetes apiserver") } cachesSynced := make(chan struct{}) go func() { log.Info("Waiting until all pre-existing resources related to policy have been received") // Wait only for certain caches, but not all! // We don't wait for nodes synchronization nor ingresses. d.waitForCacheSync( // To perform the service translation and have the BPF LB datapath // with the right service -> backend (k8s endpoints) translation. k8sAPIGroupServiceV1Core, // To perform the service translation and have the BPF LB datapath // with the right service -> backend (k8s endpoints) translation. k8sAPIGroupEndpointV1Core, // We need all network policies in place before restoring to make sure // we are enforcing the correct policies for each endpoint before // restarting. k8sAPIGroupCiliumV2, // We need all network policies in place before restoring to make sure // we are enforcing the correct policies for each endpoint before // restarting. k8sAPIGroupNetworkingV1Core, // Namespaces can contain labels which are essential for endpoints // being restored to have the right identity. k8sAPIGroupNamespaceV1Core, // Pods can contain labels which are essential for endpoints // being restored to have the right identity. k8sAPIGroupPodV1Core, ) close(cachesSynced) }() go func() { select { case <-cachesSynced: log.Info("All pre-existing resources related to policy have been received; continuing") case <-time.After(cacheSyncTimeout): log.Fatalf("Timed out waiting for pre-existing resources related to policy to be received; exiting") } }() return cachesSynced }
[ "func", "(", "d", "*", "Daemon", ")", "initK8sSubsystem", "(", ")", "<-", "chan", "struct", "{", "}", "{", "if", "err", ":=", "d", ".", "EnableK8sWatcher", "(", "option", ".", "Config", ".", "K8sWatcherQueueSize", ")", ";", "err", "!=", "nil", "{", "log", ".", "WithError", "(", "err", ")", ".", "Fatal", "(", "\"", "\"", ")", "\n", "}", "\n\n", "cachesSynced", ":=", "make", "(", "chan", "struct", "{", "}", ")", "\n\n", "go", "func", "(", ")", "{", "log", ".", "Info", "(", "\"", "\"", ")", "\n", "// Wait only for certain caches, but not all!", "// We don't wait for nodes synchronization nor ingresses.", "d", ".", "waitForCacheSync", "(", "// To perform the service translation and have the BPF LB datapath", "// with the right service -> backend (k8s endpoints) translation.", "k8sAPIGroupServiceV1Core", ",", "// To perform the service translation and have the BPF LB datapath", "// with the right service -> backend (k8s endpoints) translation.", "k8sAPIGroupEndpointV1Core", ",", "// We need all network policies in place before restoring to make sure", "// we are enforcing the correct policies for each endpoint before", "// restarting.", "k8sAPIGroupCiliumV2", ",", "// We need all network policies in place before restoring to make sure", "// we are enforcing the correct policies for each endpoint before", "// restarting.", "k8sAPIGroupNetworkingV1Core", ",", "// Namespaces can contain labels which are essential for endpoints", "// being restored to have the right identity.", "k8sAPIGroupNamespaceV1Core", ",", "// Pods can contain labels which are essential for endpoints", "// being restored to have the right identity.", "k8sAPIGroupPodV1Core", ",", ")", "\n", "close", "(", "cachesSynced", ")", "\n", "}", "(", ")", "\n\n", "go", "func", "(", ")", "{", "select", "{", "case", "<-", "cachesSynced", ":", "log", ".", "Info", "(", "\"", "\"", ")", "\n", "case", "<-", "time", ".", "After", "(", "cacheSyncTimeout", ")", ":", "log", ".", "Fatalf", "(", "\"", "\"", ")", "\n", "}", "\n", "}", "(", ")", "\n\n", "return", "cachesSynced", "\n", "}" ]
// initK8sSubsystem returns a channel for which it will be closed when all // caches essential for daemon are synchronized.
[ "initK8sSubsystem", "returns", "a", "channel", "for", "which", "it", "will", "be", "closed", "when", "all", "caches", "essential", "for", "daemon", "are", "synchronized", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/daemon/k8s_watcher.go#L297-L343
162,610
cilium/cilium
daemon/k8s_watcher.go
updateK8sEventMetric
func updateK8sEventMetric(scope string, action string, status bool) { result := "success" if status == false { result = "failed" } metrics.KubernetesEventProcessed.WithLabelValues(scope, action, result).Inc() }
go
func updateK8sEventMetric(scope string, action string, status bool) { result := "success" if status == false { result = "failed" } metrics.KubernetesEventProcessed.WithLabelValues(scope, action, result).Inc() }
[ "func", "updateK8sEventMetric", "(", "scope", "string", ",", "action", "string", ",", "status", "bool", ")", "{", "result", ":=", "\"", "\"", "\n", "if", "status", "==", "false", "{", "result", "=", "\"", "\"", "\n", "}", "\n\n", "metrics", ".", "KubernetesEventProcessed", ".", "WithLabelValues", "(", "scope", ",", "action", ",", "result", ")", ".", "Inc", "(", ")", "\n", "}" ]
// updateK8sEventMetric incrment the given metric per event type and the result // status of the function
[ "updateK8sEventMetric", "incrment", "the", "given", "metric", "per", "event", "type", "and", "the", "result", "status", "of", "the", "function" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/daemon/k8s_watcher.go#L1900-L1907
162,611
cilium/cilium
pkg/maps/policymap/policymap.go
Less
func (p PolicyEntriesDump) Less(i, j int) bool { if p[i].Key.TrafficDirection < p[j].Key.TrafficDirection { return true } return p[i].Key.TrafficDirection <= p[j].Key.TrafficDirection && p[i].Key.Identity < p[j].Key.Identity }
go
func (p PolicyEntriesDump) Less(i, j int) bool { if p[i].Key.TrafficDirection < p[j].Key.TrafficDirection { return true } return p[i].Key.TrafficDirection <= p[j].Key.TrafficDirection && p[i].Key.Identity < p[j].Key.Identity }
[ "func", "(", "p", "PolicyEntriesDump", ")", "Less", "(", "i", ",", "j", "int", ")", "bool", "{", "if", "p", "[", "i", "]", ".", "Key", ".", "TrafficDirection", "<", "p", "[", "j", "]", ".", "Key", ".", "TrafficDirection", "{", "return", "true", "\n", "}", "\n", "return", "p", "[", "i", "]", ".", "Key", ".", "TrafficDirection", "<=", "p", "[", "j", "]", ".", "Key", ".", "TrafficDirection", "&&", "p", "[", "i", "]", ".", "Key", ".", "Identity", "<", "p", "[", "j", "]", ".", "Key", ".", "Identity", "\n", "}" ]
// Less returns true if the element in index `i` has the value of // TrafficDirection lower than `j`'s TrafficDirection or if the element in index // `i` has the value of TrafficDirection lower and equal than `j`'s // TrafficDirection and the identity of element `i` is lower than the Identity // of element j.
[ "Less", "returns", "true", "if", "the", "element", "in", "index", "i", "has", "the", "value", "of", "TrafficDirection", "lower", "than", "j", "s", "TrafficDirection", "or", "if", "the", "element", "in", "index", "i", "has", "the", "value", "of", "TrafficDirection", "lower", "and", "equal", "than", "j", "s", "TrafficDirection", "and", "the", "identity", "of", "element", "i", "is", "lower", "than", "the", "Identity", "of", "element", "j", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/policymap/policymap.go#L106-L112
162,612
cilium/cilium
pkg/maps/policymap/policymap.go
ToHost
func (key *PolicyKey) ToHost() PolicyKey { if key == nil { return PolicyKey{} } n := *key n.DestPort = byteorder.NetworkToHost(n.DestPort).(uint16) return n }
go
func (key *PolicyKey) ToHost() PolicyKey { if key == nil { return PolicyKey{} } n := *key n.DestPort = byteorder.NetworkToHost(n.DestPort).(uint16) return n }
[ "func", "(", "key", "*", "PolicyKey", ")", "ToHost", "(", ")", "PolicyKey", "{", "if", "key", "==", "nil", "{", "return", "PolicyKey", "{", "}", "\n", "}", "\n\n", "n", ":=", "*", "key", "\n", "n", ".", "DestPort", "=", "byteorder", ".", "NetworkToHost", "(", "n", ".", "DestPort", ")", ".", "(", "uint16", ")", "\n", "return", "n", "\n", "}" ]
// ToHost returns a copy of key with fields converted from network byte-order // to host-byte-order if necessary.
[ "ToHost", "returns", "a", "copy", "of", "key", "with", "fields", "converted", "from", "network", "byte", "-", "order", "to", "host", "-", "byte", "-", "order", "if", "necessary", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/policymap/policymap.go#L128-L136
162,613
cilium/cilium
pkg/maps/policymap/policymap.go
ToNetwork
func (key *PolicyKey) ToNetwork() PolicyKey { if key == nil { return PolicyKey{} } n := *key n.DestPort = byteorder.HostToNetwork(n.DestPort).(uint16) return n }
go
func (key *PolicyKey) ToNetwork() PolicyKey { if key == nil { return PolicyKey{} } n := *key n.DestPort = byteorder.HostToNetwork(n.DestPort).(uint16) return n }
[ "func", "(", "key", "*", "PolicyKey", ")", "ToNetwork", "(", ")", "PolicyKey", "{", "if", "key", "==", "nil", "{", "return", "PolicyKey", "{", "}", "\n", "}", "\n\n", "n", ":=", "*", "key", "\n", "n", ".", "DestPort", "=", "byteorder", ".", "HostToNetwork", "(", "n", ".", "DestPort", ")", ".", "(", "uint16", ")", "\n", "return", "n", "\n", "}" ]
// ToNetwork returns a copy of key with fields converted from host byte-order // to network-byte-order if necessary.
[ "ToNetwork", "returns", "a", "copy", "of", "key", "with", "fields", "converted", "from", "host", "byte", "-", "order", "to", "network", "-", "byte", "-", "order", "if", "necessary", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/policymap/policymap.go#L140-L148
162,614
cilium/cilium
pkg/maps/policymap/policymap.go
newKey
func newKey(id uint32, dport uint16, proto u8proto.U8proto, trafficDirection trafficdirection.TrafficDirection) PolicyKey { return PolicyKey{ Identity: id, DestPort: byteorder.HostToNetwork(dport).(uint16), Nexthdr: uint8(proto), TrafficDirection: trafficDirection.Uint8(), } }
go
func newKey(id uint32, dport uint16, proto u8proto.U8proto, trafficDirection trafficdirection.TrafficDirection) PolicyKey { return PolicyKey{ Identity: id, DestPort: byteorder.HostToNetwork(dport).(uint16), Nexthdr: uint8(proto), TrafficDirection: trafficDirection.Uint8(), } }
[ "func", "newKey", "(", "id", "uint32", ",", "dport", "uint16", ",", "proto", "u8proto", ".", "U8proto", ",", "trafficDirection", "trafficdirection", ".", "TrafficDirection", ")", "PolicyKey", "{", "return", "PolicyKey", "{", "Identity", ":", "id", ",", "DestPort", ":", "byteorder", ".", "HostToNetwork", "(", "dport", ")", ".", "(", "uint16", ")", ",", "Nexthdr", ":", "uint8", "(", "proto", ")", ",", "TrafficDirection", ":", "trafficDirection", ".", "Uint8", "(", ")", ",", "}", "\n", "}" ]
// newKey returns a PolicyKey representing the specified parameters in network // byte-order.
[ "newKey", "returns", "a", "PolicyKey", "representing", "the", "specified", "parameters", "in", "network", "byte", "-", "order", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/policymap/policymap.go#L152-L159
162,615
cilium/cilium
pkg/maps/policymap/policymap.go
newEntry
func newEntry(proxyPort uint16) PolicyEntry { return PolicyEntry{ ProxyPort: byteorder.HostToNetwork(proxyPort).(uint16), } }
go
func newEntry(proxyPort uint16) PolicyEntry { return PolicyEntry{ ProxyPort: byteorder.HostToNetwork(proxyPort).(uint16), } }
[ "func", "newEntry", "(", "proxyPort", "uint16", ")", "PolicyEntry", "{", "return", "PolicyEntry", "{", "ProxyPort", ":", "byteorder", ".", "HostToNetwork", "(", "proxyPort", ")", ".", "(", "uint16", ")", ",", "}", "\n", "}" ]
// newEntry returns a PolicyEntry representing the specified parameters in // network byte-order.
[ "newEntry", "returns", "a", "PolicyEntry", "representing", "the", "specified", "parameters", "in", "network", "byte", "-", "order", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/policymap/policymap.go#L163-L167
162,616
cilium/cilium
pkg/maps/policymap/policymap.go
AllowKey
func (pm *PolicyMap) AllowKey(k PolicyKey, proxyPort uint16) error { return pm.Allow(k.Identity, k.DestPort, u8proto.U8proto(k.Nexthdr), trafficdirection.TrafficDirection(k.TrafficDirection), proxyPort) }
go
func (pm *PolicyMap) AllowKey(k PolicyKey, proxyPort uint16) error { return pm.Allow(k.Identity, k.DestPort, u8proto.U8proto(k.Nexthdr), trafficdirection.TrafficDirection(k.TrafficDirection), proxyPort) }
[ "func", "(", "pm", "*", "PolicyMap", ")", "AllowKey", "(", "k", "PolicyKey", ",", "proxyPort", "uint16", ")", "error", "{", "return", "pm", ".", "Allow", "(", "k", ".", "Identity", ",", "k", ".", "DestPort", ",", "u8proto", ".", "U8proto", "(", "k", ".", "Nexthdr", ")", ",", "trafficdirection", ".", "TrafficDirection", "(", "k", ".", "TrafficDirection", ")", ",", "proxyPort", ")", "\n", "}" ]
// AllowKey pushes an entry into the PolicyMap for the given PolicyKey k. // Returns an error if the update of the PolicyMap fails.
[ "AllowKey", "pushes", "an", "entry", "into", "the", "PolicyMap", "for", "the", "given", "PolicyKey", "k", ".", "Returns", "an", "error", "if", "the", "update", "of", "the", "PolicyMap", "fails", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/policymap/policymap.go#L171-L173
162,617
cilium/cilium
pkg/maps/policymap/policymap.go
Allow
func (pm *PolicyMap) Allow(id uint32, dport uint16, proto u8proto.U8proto, trafficDirection trafficdirection.TrafficDirection, proxyPort uint16) error { key := newKey(id, dport, proto, trafficDirection) entry := newEntry(proxyPort) return pm.Update(&key, &entry) }
go
func (pm *PolicyMap) Allow(id uint32, dport uint16, proto u8proto.U8proto, trafficDirection trafficdirection.TrafficDirection, proxyPort uint16) error { key := newKey(id, dport, proto, trafficDirection) entry := newEntry(proxyPort) return pm.Update(&key, &entry) }
[ "func", "(", "pm", "*", "PolicyMap", ")", "Allow", "(", "id", "uint32", ",", "dport", "uint16", ",", "proto", "u8proto", ".", "U8proto", ",", "trafficDirection", "trafficdirection", ".", "TrafficDirection", ",", "proxyPort", "uint16", ")", "error", "{", "key", ":=", "newKey", "(", "id", ",", "dport", ",", "proto", ",", "trafficDirection", ")", "\n", "entry", ":=", "newEntry", "(", "proxyPort", ")", "\n", "return", "pm", ".", "Update", "(", "&", "key", ",", "&", "entry", ")", "\n", "}" ]
// Allow pushes an entry into the PolicyMap to allow traffic in the given // `trafficDirection` for identity `id` with destination port `dport` over // protocol `proto`. It is assumed that `dport` and `proxyPort` are in host byte-order.
[ "Allow", "pushes", "an", "entry", "into", "the", "PolicyMap", "to", "allow", "traffic", "in", "the", "given", "trafficDirection", "for", "identity", "id", "with", "destination", "port", "dport", "over", "protocol", "proto", ".", "It", "is", "assumed", "that", "dport", "and", "proxyPort", "are", "in", "host", "byte", "-", "order", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/policymap/policymap.go#L178-L182
162,618
cilium/cilium
pkg/maps/policymap/policymap.go
Exists
func (pm *PolicyMap) Exists(id uint32, dport uint16, proto u8proto.U8proto, trafficDirection trafficdirection.TrafficDirection) bool { key := newKey(id, dport, proto, trafficDirection) _, err := pm.Lookup(&key) return err == nil }
go
func (pm *PolicyMap) Exists(id uint32, dport uint16, proto u8proto.U8proto, trafficDirection trafficdirection.TrafficDirection) bool { key := newKey(id, dport, proto, trafficDirection) _, err := pm.Lookup(&key) return err == nil }
[ "func", "(", "pm", "*", "PolicyMap", ")", "Exists", "(", "id", "uint32", ",", "dport", "uint16", ",", "proto", "u8proto", ".", "U8proto", ",", "trafficDirection", "trafficdirection", ".", "TrafficDirection", ")", "bool", "{", "key", ":=", "newKey", "(", "id", ",", "dport", ",", "proto", ",", "trafficDirection", ")", "\n", "_", ",", "err", ":=", "pm", ".", "Lookup", "(", "&", "key", ")", "\n", "return", "err", "==", "nil", "\n", "}" ]
// Exists determines whether PolicyMap currently contains an entry that // allows traffic in `trafficDirection` for identity `id` with destination port // `dport`over protocol `proto`. It is assumed that `dport` is in host byte-order.
[ "Exists", "determines", "whether", "PolicyMap", "currently", "contains", "an", "entry", "that", "allows", "traffic", "in", "trafficDirection", "for", "identity", "id", "with", "destination", "port", "dport", "over", "protocol", "proto", ".", "It", "is", "assumed", "that", "dport", "is", "in", "host", "byte", "-", "order", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/policymap/policymap.go#L187-L191
162,619
cilium/cilium
pkg/maps/policymap/policymap.go
DeleteKey
func (pm *PolicyMap) DeleteKey(key PolicyKey) error { k := key.ToNetwork() return pm.Map.Delete(&k) }
go
func (pm *PolicyMap) DeleteKey(key PolicyKey) error { k := key.ToNetwork() return pm.Map.Delete(&k) }
[ "func", "(", "pm", "*", "PolicyMap", ")", "DeleteKey", "(", "key", "PolicyKey", ")", "error", "{", "k", ":=", "key", ".", "ToNetwork", "(", ")", "\n", "return", "pm", ".", "Map", ".", "Delete", "(", "&", "k", ")", "\n", "}" ]
// DeleteKey deletes the key-value pair from the given PolicyMap with PolicyKey // k. Returns an error if deletion from the PolicyMap fails.
[ "DeleteKey", "deletes", "the", "key", "-", "value", "pair", "from", "the", "given", "PolicyMap", "with", "PolicyKey", "k", ".", "Returns", "an", "error", "if", "deletion", "from", "the", "PolicyMap", "fails", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/policymap/policymap.go#L195-L198
162,620
cilium/cilium
pkg/maps/policymap/policymap.go
Delete
func (pm *PolicyMap) Delete(id uint32, dport uint16, proto u8proto.U8proto, trafficDirection trafficdirection.TrafficDirection) error { k := newKey(id, dport, proto, trafficDirection) return pm.Map.Delete(&k) }
go
func (pm *PolicyMap) Delete(id uint32, dport uint16, proto u8proto.U8proto, trafficDirection trafficdirection.TrafficDirection) error { k := newKey(id, dport, proto, trafficDirection) return pm.Map.Delete(&k) }
[ "func", "(", "pm", "*", "PolicyMap", ")", "Delete", "(", "id", "uint32", ",", "dport", "uint16", ",", "proto", "u8proto", ".", "U8proto", ",", "trafficDirection", "trafficdirection", ".", "TrafficDirection", ")", "error", "{", "k", ":=", "newKey", "(", "id", ",", "dport", ",", "proto", ",", "trafficDirection", ")", "\n", "return", "pm", ".", "Map", ".", "Delete", "(", "&", "k", ")", "\n", "}" ]
// Delete removes an entry from the PolicyMap for identity `id` // sending traffic in direction `trafficDirection` with destination port `dport` // over protocol `proto`. It is assumed that `dport` is in host byte-order. // Returns an error if the deletion did not succeed.
[ "Delete", "removes", "an", "entry", "from", "the", "PolicyMap", "for", "identity", "id", "sending", "traffic", "in", "direction", "trafficDirection", "with", "destination", "port", "dport", "over", "protocol", "proto", ".", "It", "is", "assumed", "that", "dport", "is", "in", "host", "byte", "-", "order", ".", "Returns", "an", "error", "if", "the", "deletion", "did", "not", "succeed", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/policymap/policymap.go#L204-L207
162,621
cilium/cilium
pkg/maps/policymap/policymap.go
String
func (pm *PolicyMap) String() string { path, err := pm.Path() if err != nil { return err.Error() } return path }
go
func (pm *PolicyMap) String() string { path, err := pm.Path() if err != nil { return err.Error() } return path }
[ "func", "(", "pm", "*", "PolicyMap", ")", "String", "(", ")", "string", "{", "path", ",", "err", ":=", "pm", ".", "Path", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", ".", "Error", "(", ")", "\n", "}", "\n", "return", "path", "\n", "}" ]
// String returns a human-readable string representing the policy map.
[ "String", "returns", "a", "human", "-", "readable", "string", "representing", "the", "policy", "map", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/policymap/policymap.go#L216-L222
162,622
cilium/cilium
pkg/maps/policymap/policymap.go
Open
func Open(path string) (*PolicyMap, error) { m := newMap(path) if err := m.Open(); err != nil { return nil, err } return m, nil }
go
func Open(path string) (*PolicyMap, error) { m := newMap(path) if err := m.Open(); err != nil { return nil, err } return m, nil }
[ "func", "Open", "(", "path", "string", ")", "(", "*", "PolicyMap", ",", "error", ")", "{", "m", ":=", "newMap", "(", "path", ")", "\n", "if", "err", ":=", "m", ".", "Open", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "return", "m", ",", "nil", "\n", "}" ]
// Open opens the policymap at the specified path.
[ "Open", "opens", "the", "policymap", "at", "the", "specified", "path", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/policymap/policymap.go#L286-L292
162,623
cilium/cilium
pkg/health/server/prober.go
copyResultRLocked
func (p *prober) copyResultRLocked(ip string) *models.PathStatus { status := p.results[ipString(ip)] if status == nil { return nil } result := &models.PathStatus{ IP: ip, } paths := map[**models.ConnectivityStatus]*models.ConnectivityStatus{ &result.Icmp: status.Icmp, &result.HTTP: status.HTTP, } for res, value := range paths { if value != nil { *res = &*value } } return result }
go
func (p *prober) copyResultRLocked(ip string) *models.PathStatus { status := p.results[ipString(ip)] if status == nil { return nil } result := &models.PathStatus{ IP: ip, } paths := map[**models.ConnectivityStatus]*models.ConnectivityStatus{ &result.Icmp: status.Icmp, &result.HTTP: status.HTTP, } for res, value := range paths { if value != nil { *res = &*value } } return result }
[ "func", "(", "p", "*", "prober", ")", "copyResultRLocked", "(", "ip", "string", ")", "*", "models", ".", "PathStatus", "{", "status", ":=", "p", ".", "results", "[", "ipString", "(", "ip", ")", "]", "\n", "if", "status", "==", "nil", "{", "return", "nil", "\n", "}", "\n\n", "result", ":=", "&", "models", ".", "PathStatus", "{", "IP", ":", "ip", ",", "}", "\n", "paths", ":=", "map", "[", "*", "*", "models", ".", "ConnectivityStatus", "]", "*", "models", ".", "ConnectivityStatus", "{", "&", "result", ".", "Icmp", ":", "status", ".", "Icmp", ",", "&", "result", ".", "HTTP", ":", "status", ".", "HTTP", ",", "}", "\n", "for", "res", ",", "value", ":=", "range", "paths", "{", "if", "value", "!=", "nil", "{", "*", "res", "=", "&", "*", "value", "\n", "}", "\n", "}", "\n", "return", "result", "\n", "}" ]
// copyResultRLocked makes a copy of the path status for the specified IP.
[ "copyResultRLocked", "makes", "a", "copy", "of", "the", "path", "status", "for", "the", "specified", "IP", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/health/server/prober.go#L63-L82
162,624
cilium/cilium
pkg/health/server/prober.go
getResults
func (p *prober) getResults() *healthReport { p.RLock() defer p.RUnlock() // De-duplicate IPs in 'p.nodes' by building a map based on node.Name. resultMap := map[string]*models.NodeStatus{} for _, node := range p.nodes { if resultMap[node.Name] != nil { continue } primaryIP := node.PrimaryIP() healthIP := node.HealthIP() status := &models.NodeStatus{ Name: node.Name, Host: &models.HostStatus{ PrimaryAddress: p.copyResultRLocked(primaryIP), }, } if healthIP != "" { status.Endpoint = p.copyResultRLocked(healthIP) } secondaryResults := []*models.PathStatus{} for _, addr := range node.SecondaryAddresses { if addr.Enabled { secondaryStatus := p.copyResultRLocked(addr.IP) secondaryResults = append(secondaryResults, secondaryStatus) } } status.Host.SecondaryAddresses = secondaryResults resultMap[node.Name] = status } result := &healthReport{startTime: p.start} for _, res := range resultMap { result.nodes = append(result.nodes, res) } return result }
go
func (p *prober) getResults() *healthReport { p.RLock() defer p.RUnlock() // De-duplicate IPs in 'p.nodes' by building a map based on node.Name. resultMap := map[string]*models.NodeStatus{} for _, node := range p.nodes { if resultMap[node.Name] != nil { continue } primaryIP := node.PrimaryIP() healthIP := node.HealthIP() status := &models.NodeStatus{ Name: node.Name, Host: &models.HostStatus{ PrimaryAddress: p.copyResultRLocked(primaryIP), }, } if healthIP != "" { status.Endpoint = p.copyResultRLocked(healthIP) } secondaryResults := []*models.PathStatus{} for _, addr := range node.SecondaryAddresses { if addr.Enabled { secondaryStatus := p.copyResultRLocked(addr.IP) secondaryResults = append(secondaryResults, secondaryStatus) } } status.Host.SecondaryAddresses = secondaryResults resultMap[node.Name] = status } result := &healthReport{startTime: p.start} for _, res := range resultMap { result.nodes = append(result.nodes, res) } return result }
[ "func", "(", "p", "*", "prober", ")", "getResults", "(", ")", "*", "healthReport", "{", "p", ".", "RLock", "(", ")", "\n", "defer", "p", ".", "RUnlock", "(", ")", "\n\n", "// De-duplicate IPs in 'p.nodes' by building a map based on node.Name.", "resultMap", ":=", "map", "[", "string", "]", "*", "models", ".", "NodeStatus", "{", "}", "\n", "for", "_", ",", "node", ":=", "range", "p", ".", "nodes", "{", "if", "resultMap", "[", "node", ".", "Name", "]", "!=", "nil", "{", "continue", "\n", "}", "\n", "primaryIP", ":=", "node", ".", "PrimaryIP", "(", ")", "\n", "healthIP", ":=", "node", ".", "HealthIP", "(", ")", "\n", "status", ":=", "&", "models", ".", "NodeStatus", "{", "Name", ":", "node", ".", "Name", ",", "Host", ":", "&", "models", ".", "HostStatus", "{", "PrimaryAddress", ":", "p", ".", "copyResultRLocked", "(", "primaryIP", ")", ",", "}", ",", "}", "\n", "if", "healthIP", "!=", "\"", "\"", "{", "status", ".", "Endpoint", "=", "p", ".", "copyResultRLocked", "(", "healthIP", ")", "\n", "}", "\n", "secondaryResults", ":=", "[", "]", "*", "models", ".", "PathStatus", "{", "}", "\n", "for", "_", ",", "addr", ":=", "range", "node", ".", "SecondaryAddresses", "{", "if", "addr", ".", "Enabled", "{", "secondaryStatus", ":=", "p", ".", "copyResultRLocked", "(", "addr", ".", "IP", ")", "\n", "secondaryResults", "=", "append", "(", "secondaryResults", ",", "secondaryStatus", ")", "\n", "}", "\n", "}", "\n", "status", ".", "Host", ".", "SecondaryAddresses", "=", "secondaryResults", "\n", "resultMap", "[", "node", ".", "Name", "]", "=", "status", "\n", "}", "\n\n", "result", ":=", "&", "healthReport", "{", "startTime", ":", "p", ".", "start", "}", "\n", "for", "_", ",", "res", ":=", "range", "resultMap", "{", "result", ".", "nodes", "=", "append", "(", "result", ".", "nodes", ",", "res", ")", "\n", "}", "\n", "return", "result", "\n", "}" ]
// getResults gathers a copy of all of the results for nodes currently in the // cluster.
[ "getResults", "gathers", "a", "copy", "of", "all", "of", "the", "results", "for", "nodes", "currently", "in", "the", "cluster", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/health/server/prober.go#L86-L123
162,625
cilium/cilium
pkg/health/server/prober.go
resolveIP
func resolveIP(n *healthNode, addr *ciliumModels.NodeAddressingElement, proto string, primary bool) (string, *net.IPAddr) { node := n.NodeElement network := "ip6:icmp" if isIPv4(addr.IP) { network = "ip4:icmp" } scopedLog := log.WithFields(logrus.Fields{ logfields.NodeName: node.Name, logfields.IPAddr: addr.IP, "primary": primary, }) if skipAddress(addr) { scopedLog.Debug("Skipping probe for address") return "", nil } ra, err := net.ResolveIPAddr(network, addr.IP) if err != nil { scopedLog.Debug("Unable to resolve address") return "", nil } scopedLog.WithField("protocol", proto).Debug("Probing for connectivity to node") return node.Name, ra }
go
func resolveIP(n *healthNode, addr *ciliumModels.NodeAddressingElement, proto string, primary bool) (string, *net.IPAddr) { node := n.NodeElement network := "ip6:icmp" if isIPv4(addr.IP) { network = "ip4:icmp" } scopedLog := log.WithFields(logrus.Fields{ logfields.NodeName: node.Name, logfields.IPAddr: addr.IP, "primary": primary, }) if skipAddress(addr) { scopedLog.Debug("Skipping probe for address") return "", nil } ra, err := net.ResolveIPAddr(network, addr.IP) if err != nil { scopedLog.Debug("Unable to resolve address") return "", nil } scopedLog.WithField("protocol", proto).Debug("Probing for connectivity to node") return node.Name, ra }
[ "func", "resolveIP", "(", "n", "*", "healthNode", ",", "addr", "*", "ciliumModels", ".", "NodeAddressingElement", ",", "proto", "string", ",", "primary", "bool", ")", "(", "string", ",", "*", "net", ".", "IPAddr", ")", "{", "node", ":=", "n", ".", "NodeElement", "\n", "network", ":=", "\"", "\"", "\n", "if", "isIPv4", "(", "addr", ".", "IP", ")", "{", "network", "=", "\"", "\"", "\n", "}", "\n", "scopedLog", ":=", "log", ".", "WithFields", "(", "logrus", ".", "Fields", "{", "logfields", ".", "NodeName", ":", "node", ".", "Name", ",", "logfields", ".", "IPAddr", ":", "addr", ".", "IP", ",", "\"", "\"", ":", "primary", ",", "}", ")", "\n\n", "if", "skipAddress", "(", "addr", ")", "{", "scopedLog", ".", "Debug", "(", "\"", "\"", ")", "\n", "return", "\"", "\"", ",", "nil", "\n", "}", "\n\n", "ra", ",", "err", ":=", "net", ".", "ResolveIPAddr", "(", "network", ",", "addr", ".", "IP", ")", "\n", "if", "err", "!=", "nil", "{", "scopedLog", ".", "Debug", "(", "\"", "\"", ")", "\n", "return", "\"", "\"", ",", "nil", "\n", "}", "\n\n", "scopedLog", ".", "WithField", "(", "\"", "\"", ",", "proto", ")", ".", "Debug", "(", "\"", "\"", ")", "\n", "return", "node", ".", "Name", ",", "ra", "\n", "}" ]
// resolveIP attempts to sanitize 'node' and 'ip', and if successful, returns // the name of the node and the IP address specified in the addressing element. // If validation fails or this IP should not be pinged, 'ip' is returned as nil.
[ "resolveIP", "attempts", "to", "sanitize", "node", "and", "ip", "and", "if", "successful", "returns", "the", "name", "of", "the", "node", "and", "the", "IP", "address", "specified", "in", "the", "addressing", "element", ".", "If", "validation", "fails", "or", "this", "IP", "should", "not", "be", "pinged", "ip", "is", "returned", "as", "nil", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/health/server/prober.go#L137-L162
162,626
cilium/cilium
pkg/health/server/prober.go
markIPsLocked
func (p *prober) markIPsLocked() { for ip, node := range p.nodes { node.deletionMark = true p.nodes[ip] = node } }
go
func (p *prober) markIPsLocked() { for ip, node := range p.nodes { node.deletionMark = true p.nodes[ip] = node } }
[ "func", "(", "p", "*", "prober", ")", "markIPsLocked", "(", ")", "{", "for", "ip", ",", "node", ":=", "range", "p", ".", "nodes", "{", "node", ".", "deletionMark", "=", "true", "\n", "p", ".", "nodes", "[", "ip", "]", "=", "node", "\n", "}", "\n", "}" ]
// markIPsLocked marks all nodes in the prober for deletion.
[ "markIPsLocked", "marks", "all", "nodes", "in", "the", "prober", "for", "deletion", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/health/server/prober.go#L165-L170
162,627
cilium/cilium
pkg/health/server/prober.go
sweepIPsLocked
func (p *prober) sweepIPsLocked() { for ip, node := range p.nodes { if node.deletionMark { // Remove deleted nodes from: // * Results (accessed from ICMP pinger or TCP prober) // * ICMP pinger // * TCP prober for elem := range node.Addresses() { delete(p.results, ipString(elem.IP)) p.RemoveIP(elem.IP) // ICMP pinger } delete(p.nodes, ip) // TCP prober } } }
go
func (p *prober) sweepIPsLocked() { for ip, node := range p.nodes { if node.deletionMark { // Remove deleted nodes from: // * Results (accessed from ICMP pinger or TCP prober) // * ICMP pinger // * TCP prober for elem := range node.Addresses() { delete(p.results, ipString(elem.IP)) p.RemoveIP(elem.IP) // ICMP pinger } delete(p.nodes, ip) // TCP prober } } }
[ "func", "(", "p", "*", "prober", ")", "sweepIPsLocked", "(", ")", "{", "for", "ip", ",", "node", ":=", "range", "p", ".", "nodes", "{", "if", "node", ".", "deletionMark", "{", "// Remove deleted nodes from:", "// * Results (accessed from ICMP pinger or TCP prober)", "// * ICMP pinger", "// * TCP prober", "for", "elem", ":=", "range", "node", ".", "Addresses", "(", ")", "{", "delete", "(", "p", ".", "results", ",", "ipString", "(", "elem", ".", "IP", ")", ")", "\n", "p", ".", "RemoveIP", "(", "elem", ".", "IP", ")", "// ICMP pinger", "\n", "}", "\n", "delete", "(", "p", ".", "nodes", ",", "ip", ")", "// TCP prober", "\n", "}", "\n", "}", "\n", "}" ]
// sweepIPsLocked iterates through nodes in the prober and removes nodes which // are marked for deletion.
[ "sweepIPsLocked", "iterates", "through", "nodes", "in", "the", "prober", "and", "removes", "nodes", "which", "are", "marked", "for", "deletion", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/health/server/prober.go#L174-L188
162,628
cilium/cilium
pkg/health/server/prober.go
setNodes
func (p *prober) setNodes(nodes nodeMap) { p.Lock() defer p.Unlock() // Mark all nodes for deletion, insert nodes that should not be deleted // then at the end of the function, sweep all nodes that remain as // "to be deleted". p.markIPsLocked() for _, n := range nodes { for elem, primary := range n.Addresses() { _, addr := resolveIP(&n, elem, "icmp", primary) ip := ipString(elem.IP) result := &models.ConnectivityStatus{} if addr == nil { result.Status = "Failed to resolve IP" } else { result.Status = "Connection timed out" p.AddIPAddr(addr) p.nodes[ip] = n } if p.results[ip] == nil { p.results[ip] = &models.PathStatus{ IP: elem.IP, } } p.results[ip].Icmp = result } } p.sweepIPsLocked() }
go
func (p *prober) setNodes(nodes nodeMap) { p.Lock() defer p.Unlock() // Mark all nodes for deletion, insert nodes that should not be deleted // then at the end of the function, sweep all nodes that remain as // "to be deleted". p.markIPsLocked() for _, n := range nodes { for elem, primary := range n.Addresses() { _, addr := resolveIP(&n, elem, "icmp", primary) ip := ipString(elem.IP) result := &models.ConnectivityStatus{} if addr == nil { result.Status = "Failed to resolve IP" } else { result.Status = "Connection timed out" p.AddIPAddr(addr) p.nodes[ip] = n } if p.results[ip] == nil { p.results[ip] = &models.PathStatus{ IP: elem.IP, } } p.results[ip].Icmp = result } } p.sweepIPsLocked() }
[ "func", "(", "p", "*", "prober", ")", "setNodes", "(", "nodes", "nodeMap", ")", "{", "p", ".", "Lock", "(", ")", "\n", "defer", "p", ".", "Unlock", "(", ")", "\n\n", "// Mark all nodes for deletion, insert nodes that should not be deleted", "// then at the end of the function, sweep all nodes that remain as", "// \"to be deleted\".", "p", ".", "markIPsLocked", "(", ")", "\n\n", "for", "_", ",", "n", ":=", "range", "nodes", "{", "for", "elem", ",", "primary", ":=", "range", "n", ".", "Addresses", "(", ")", "{", "_", ",", "addr", ":=", "resolveIP", "(", "&", "n", ",", "elem", ",", "\"", "\"", ",", "primary", ")", "\n\n", "ip", ":=", "ipString", "(", "elem", ".", "IP", ")", "\n", "result", ":=", "&", "models", ".", "ConnectivityStatus", "{", "}", "\n", "if", "addr", "==", "nil", "{", "result", ".", "Status", "=", "\"", "\"", "\n", "}", "else", "{", "result", ".", "Status", "=", "\"", "\"", "\n", "p", ".", "AddIPAddr", "(", "addr", ")", "\n", "p", ".", "nodes", "[", "ip", "]", "=", "n", "\n", "}", "\n\n", "if", "p", ".", "results", "[", "ip", "]", "==", "nil", "{", "p", ".", "results", "[", "ip", "]", "=", "&", "models", ".", "PathStatus", "{", "IP", ":", "elem", ".", "IP", ",", "}", "\n", "}", "\n", "p", ".", "results", "[", "ip", "]", ".", "Icmp", "=", "result", "\n", "}", "\n", "}", "\n\n", "p", ".", "sweepIPsLocked", "(", ")", "\n", "}" ]
// setNodes sets the list of nodes for the prober, and updates the pinger to // start sending pings to all of the nodes. // setNodes will steal references to nodes referenced from 'nodes', so the // caller should not modify them after a call to setNodes.
[ "setNodes", "sets", "the", "list", "of", "nodes", "for", "the", "prober", "and", "updates", "the", "pinger", "to", "start", "sending", "pings", "to", "all", "of", "the", "nodes", ".", "setNodes", "will", "steal", "references", "to", "nodes", "referenced", "from", "nodes", "so", "the", "caller", "should", "not", "modify", "them", "after", "a", "call", "to", "setNodes", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/health/server/prober.go#L194-L227
162,629
cilium/cilium
pkg/health/server/prober.go
Run
func (p *prober) Run() error { err := p.Pinger.Run() p.runHTTPProbe() return err }
go
func (p *prober) Run() error { err := p.Pinger.Run() p.runHTTPProbe() return err }
[ "func", "(", "p", "*", "prober", ")", "Run", "(", ")", "error", "{", "err", ":=", "p", ".", "Pinger", ".", "Run", "(", ")", "\n", "p", ".", "runHTTPProbe", "(", ")", "\n", "return", "err", "\n", "}" ]
// Run sends a single probes out to all of the other cilium nodes to gather // connectivity status for the cluster.
[ "Run", "sends", "a", "single", "probes", "out", "to", "all", "of", "the", "other", "cilium", "nodes", "to", "gather", "connectivity", "status", "for", "the", "cluster", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/health/server/prober.go#L332-L336
162,630
cilium/cilium
api/v1/client/ipam/post_ip_a_m_ip_parameters.go
WithTimeout
func (o *PostIPAMIPParams) WithTimeout(timeout time.Duration) *PostIPAMIPParams { o.SetTimeout(timeout) return o }
go
func (o *PostIPAMIPParams) WithTimeout(timeout time.Duration) *PostIPAMIPParams { o.SetTimeout(timeout) return o }
[ "func", "(", "o", "*", "PostIPAMIPParams", ")", "WithTimeout", "(", "timeout", "time", ".", "Duration", ")", "*", "PostIPAMIPParams", "{", "o", ".", "SetTimeout", "(", "timeout", ")", "\n", "return", "o", "\n", "}" ]
// WithTimeout adds the timeout to the post IP a m IP params
[ "WithTimeout", "adds", "the", "timeout", "to", "the", "post", "IP", "a", "m", "IP", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/ipam/post_ip_a_m_ip_parameters.go#L78-L81
162,631
cilium/cilium
api/v1/client/ipam/post_ip_a_m_ip_parameters.go
WithContext
func (o *PostIPAMIPParams) WithContext(ctx context.Context) *PostIPAMIPParams { o.SetContext(ctx) return o }
go
func (o *PostIPAMIPParams) WithContext(ctx context.Context) *PostIPAMIPParams { o.SetContext(ctx) return o }
[ "func", "(", "o", "*", "PostIPAMIPParams", ")", "WithContext", "(", "ctx", "context", ".", "Context", ")", "*", "PostIPAMIPParams", "{", "o", ".", "SetContext", "(", "ctx", ")", "\n", "return", "o", "\n", "}" ]
// WithContext adds the context to the post IP a m IP params
[ "WithContext", "adds", "the", "context", "to", "the", "post", "IP", "a", "m", "IP", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/ipam/post_ip_a_m_ip_parameters.go#L89-L92
162,632
cilium/cilium
api/v1/client/ipam/post_ip_a_m_ip_parameters.go
WithHTTPClient
func (o *PostIPAMIPParams) WithHTTPClient(client *http.Client) *PostIPAMIPParams { o.SetHTTPClient(client) return o }
go
func (o *PostIPAMIPParams) WithHTTPClient(client *http.Client) *PostIPAMIPParams { o.SetHTTPClient(client) return o }
[ "func", "(", "o", "*", "PostIPAMIPParams", ")", "WithHTTPClient", "(", "client", "*", "http", ".", "Client", ")", "*", "PostIPAMIPParams", "{", "o", ".", "SetHTTPClient", "(", "client", ")", "\n", "return", "o", "\n", "}" ]
// WithHTTPClient adds the HTTPClient to the post IP a m IP params
[ "WithHTTPClient", "adds", "the", "HTTPClient", "to", "the", "post", "IP", "a", "m", "IP", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/ipam/post_ip_a_m_ip_parameters.go#L100-L103
162,633
cilium/cilium
api/v1/client/ipam/post_ip_a_m_ip_parameters.go
WithIP
func (o *PostIPAMIPParams) WithIP(ip string) *PostIPAMIPParams { o.SetIP(ip) return o }
go
func (o *PostIPAMIPParams) WithIP(ip string) *PostIPAMIPParams { o.SetIP(ip) return o }
[ "func", "(", "o", "*", "PostIPAMIPParams", ")", "WithIP", "(", "ip", "string", ")", "*", "PostIPAMIPParams", "{", "o", ".", "SetIP", "(", "ip", ")", "\n", "return", "o", "\n", "}" ]
// WithIP adds the ip to the post IP a m IP params
[ "WithIP", "adds", "the", "ip", "to", "the", "post", "IP", "a", "m", "IP", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/ipam/post_ip_a_m_ip_parameters.go#L111-L114
162,634
cilium/cilium
api/v1/client/ipam/post_ip_a_m_ip_parameters.go
WithOwner
func (o *PostIPAMIPParams) WithOwner(owner *string) *PostIPAMIPParams { o.SetOwner(owner) return o }
go
func (o *PostIPAMIPParams) WithOwner(owner *string) *PostIPAMIPParams { o.SetOwner(owner) return o }
[ "func", "(", "o", "*", "PostIPAMIPParams", ")", "WithOwner", "(", "owner", "*", "string", ")", "*", "PostIPAMIPParams", "{", "o", ".", "SetOwner", "(", "owner", ")", "\n", "return", "o", "\n", "}" ]
// WithOwner adds the owner to the post IP a m IP params
[ "WithOwner", "adds", "the", "owner", "to", "the", "post", "IP", "a", "m", "IP", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/ipam/post_ip_a_m_ip_parameters.go#L122-L125
162,635
cilium/cilium
api/v1/client/daemon/get_debuginfo_parameters.go
WithTimeout
func (o *GetDebuginfoParams) WithTimeout(timeout time.Duration) *GetDebuginfoParams { o.SetTimeout(timeout) return o }
go
func (o *GetDebuginfoParams) WithTimeout(timeout time.Duration) *GetDebuginfoParams { o.SetTimeout(timeout) return o }
[ "func", "(", "o", "*", "GetDebuginfoParams", ")", "WithTimeout", "(", "timeout", "time", ".", "Duration", ")", "*", "GetDebuginfoParams", "{", "o", ".", "SetTimeout", "(", "timeout", ")", "\n", "return", "o", "\n", "}" ]
// WithTimeout adds the timeout to the get debuginfo params
[ "WithTimeout", "adds", "the", "timeout", "to", "the", "get", "debuginfo", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/daemon/get_debuginfo_parameters.go#L69-L72
162,636
cilium/cilium
api/v1/client/daemon/get_debuginfo_parameters.go
WithContext
func (o *GetDebuginfoParams) WithContext(ctx context.Context) *GetDebuginfoParams { o.SetContext(ctx) return o }
go
func (o *GetDebuginfoParams) WithContext(ctx context.Context) *GetDebuginfoParams { o.SetContext(ctx) return o }
[ "func", "(", "o", "*", "GetDebuginfoParams", ")", "WithContext", "(", "ctx", "context", ".", "Context", ")", "*", "GetDebuginfoParams", "{", "o", ".", "SetContext", "(", "ctx", ")", "\n", "return", "o", "\n", "}" ]
// WithContext adds the context to the get debuginfo params
[ "WithContext", "adds", "the", "context", "to", "the", "get", "debuginfo", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/daemon/get_debuginfo_parameters.go#L80-L83
162,637
cilium/cilium
api/v1/client/daemon/get_debuginfo_parameters.go
WithHTTPClient
func (o *GetDebuginfoParams) WithHTTPClient(client *http.Client) *GetDebuginfoParams { o.SetHTTPClient(client) return o }
go
func (o *GetDebuginfoParams) WithHTTPClient(client *http.Client) *GetDebuginfoParams { o.SetHTTPClient(client) return o }
[ "func", "(", "o", "*", "GetDebuginfoParams", ")", "WithHTTPClient", "(", "client", "*", "http", ".", "Client", ")", "*", "GetDebuginfoParams", "{", "o", ".", "SetHTTPClient", "(", "client", ")", "\n", "return", "o", "\n", "}" ]
// WithHTTPClient adds the HTTPClient to the get debuginfo params
[ "WithHTTPClient", "adds", "the", "HTTPClient", "to", "the", "get", "debuginfo", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/daemon/get_debuginfo_parameters.go#L91-L94
162,638
cilium/cilium
pkg/labels/filter.go
String
func (p LabelPrefix) String() string { s := fmt.Sprintf("%s:%s", p.Source, p.Prefix) if p.Ignore { s = "!" + s } return s }
go
func (p LabelPrefix) String() string { s := fmt.Sprintf("%s:%s", p.Source, p.Prefix) if p.Ignore { s = "!" + s } return s }
[ "func", "(", "p", "LabelPrefix", ")", "String", "(", ")", "string", "{", "s", ":=", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "p", ".", "Source", ",", "p", ".", "Prefix", ")", "\n", "if", "p", ".", "Ignore", "{", "s", "=", "\"", "\"", "+", "s", "\n", "}", "\n\n", "return", "s", "\n", "}" ]
// String returns a human readable representation of the LabelPrefix
[ "String", "returns", "a", "human", "readable", "representation", "of", "the", "LabelPrefix" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/labels/filter.go#L53-L60
162,639
cilium/cilium
pkg/labels/filter.go
matches
func (p LabelPrefix) matches(l Label) (bool, int) { if p.Source != "" && p.Source != l.Source { return false, 0 } // If no regular expression is available, fall back to prefix matching if p.expr == nil { return strings.HasPrefix(l.Key, p.Prefix), len(p.Prefix) } res := p.expr.FindStringIndex(l.Key) // No match if regexp was not found if res == nil { return false, 0 } // Otherwise match if match was found at start of key return res[0] == 0, res[1] }
go
func (p LabelPrefix) matches(l Label) (bool, int) { if p.Source != "" && p.Source != l.Source { return false, 0 } // If no regular expression is available, fall back to prefix matching if p.expr == nil { return strings.HasPrefix(l.Key, p.Prefix), len(p.Prefix) } res := p.expr.FindStringIndex(l.Key) // No match if regexp was not found if res == nil { return false, 0 } // Otherwise match if match was found at start of key return res[0] == 0, res[1] }
[ "func", "(", "p", "LabelPrefix", ")", "matches", "(", "l", "Label", ")", "(", "bool", ",", "int", ")", "{", "if", "p", ".", "Source", "!=", "\"", "\"", "&&", "p", ".", "Source", "!=", "l", ".", "Source", "{", "return", "false", ",", "0", "\n", "}", "\n\n", "// If no regular expression is available, fall back to prefix matching", "if", "p", ".", "expr", "==", "nil", "{", "return", "strings", ".", "HasPrefix", "(", "l", ".", "Key", ",", "p", ".", "Prefix", ")", ",", "len", "(", "p", ".", "Prefix", ")", "\n", "}", "\n\n", "res", ":=", "p", ".", "expr", ".", "FindStringIndex", "(", "l", ".", "Key", ")", "\n\n", "// No match if regexp was not found", "if", "res", "==", "nil", "{", "return", "false", ",", "0", "\n", "}", "\n\n", "// Otherwise match if match was found at start of key", "return", "res", "[", "0", "]", "==", "0", ",", "res", "[", "1", "]", "\n", "}" ]
// matches returns true and the length of the matched section if the label is // matched by the LabelPrefix. The Ignore flag has no effect at this point.
[ "matches", "returns", "true", "and", "the", "length", "of", "the", "matched", "section", "if", "the", "label", "is", "matched", "by", "the", "LabelPrefix", ".", "The", "Ignore", "flag", "has", "no", "effect", "at", "this", "point", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/labels/filter.go#L64-L83
162,640
cilium/cilium
pkg/labels/filter.go
parseLabelPrefix
func parseLabelPrefix(label string) (*LabelPrefix, error) { labelPrefix := LabelPrefix{} i := strings.IndexByte(label, ':') if i >= 0 { labelPrefix.Source = label[:i] labelPrefix.Prefix = label[i+1:] } else { labelPrefix.Prefix = label } if labelPrefix.Prefix[0] == '!' { labelPrefix.Ignore = true labelPrefix.Prefix = labelPrefix.Prefix[1:] } r, err := regexp.Compile(labelPrefix.Prefix) if err != nil { return nil, fmt.Errorf("Unable to compile regexp: %s", err) } labelPrefix.expr = r return &labelPrefix, nil }
go
func parseLabelPrefix(label string) (*LabelPrefix, error) { labelPrefix := LabelPrefix{} i := strings.IndexByte(label, ':') if i >= 0 { labelPrefix.Source = label[:i] labelPrefix.Prefix = label[i+1:] } else { labelPrefix.Prefix = label } if labelPrefix.Prefix[0] == '!' { labelPrefix.Ignore = true labelPrefix.Prefix = labelPrefix.Prefix[1:] } r, err := regexp.Compile(labelPrefix.Prefix) if err != nil { return nil, fmt.Errorf("Unable to compile regexp: %s", err) } labelPrefix.expr = r return &labelPrefix, nil }
[ "func", "parseLabelPrefix", "(", "label", "string", ")", "(", "*", "LabelPrefix", ",", "error", ")", "{", "labelPrefix", ":=", "LabelPrefix", "{", "}", "\n", "i", ":=", "strings", ".", "IndexByte", "(", "label", ",", "':'", ")", "\n", "if", "i", ">=", "0", "{", "labelPrefix", ".", "Source", "=", "label", "[", ":", "i", "]", "\n", "labelPrefix", ".", "Prefix", "=", "label", "[", "i", "+", "1", ":", "]", "\n", "}", "else", "{", "labelPrefix", ".", "Prefix", "=", "label", "\n", "}", "\n\n", "if", "labelPrefix", ".", "Prefix", "[", "0", "]", "==", "'!'", "{", "labelPrefix", ".", "Ignore", "=", "true", "\n", "labelPrefix", ".", "Prefix", "=", "labelPrefix", ".", "Prefix", "[", "1", ":", "]", "\n", "}", "\n\n", "r", ",", "err", ":=", "regexp", ".", "Compile", "(", "labelPrefix", ".", "Prefix", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "labelPrefix", ".", "expr", "=", "r", "\n\n", "return", "&", "labelPrefix", ",", "nil", "\n", "}" ]
// parseLabelPrefix returns a LabelPrefix created from the string label parameter.
[ "parseLabelPrefix", "returns", "a", "LabelPrefix", "created", "from", "the", "string", "label", "parameter", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/labels/filter.go#L86-L108
162,641
cilium/cilium
pkg/labels/filter.go
ParseLabelPrefixCfg
func ParseLabelPrefixCfg(prefixes []string, file string) error { cfg, err := readLabelPrefixCfgFrom(file) if err != nil { return fmt.Errorf("Unable to read label prefix file: %s", err) } for _, label := range prefixes { p, err := parseLabelPrefix(label) if err != nil { return err } if !p.Ignore { cfg.whitelist = true } cfg.LabelPrefixes = append(cfg.LabelPrefixes, p) } validLabelPrefixes = cfg log.Info("Valid label prefix configuration:") for _, l := range validLabelPrefixes.LabelPrefixes { log.Infof(" - %s", l) } return nil }
go
func ParseLabelPrefixCfg(prefixes []string, file string) error { cfg, err := readLabelPrefixCfgFrom(file) if err != nil { return fmt.Errorf("Unable to read label prefix file: %s", err) } for _, label := range prefixes { p, err := parseLabelPrefix(label) if err != nil { return err } if !p.Ignore { cfg.whitelist = true } cfg.LabelPrefixes = append(cfg.LabelPrefixes, p) } validLabelPrefixes = cfg log.Info("Valid label prefix configuration:") for _, l := range validLabelPrefixes.LabelPrefixes { log.Infof(" - %s", l) } return nil }
[ "func", "ParseLabelPrefixCfg", "(", "prefixes", "[", "]", "string", ",", "file", "string", ")", "error", "{", "cfg", ",", "err", ":=", "readLabelPrefixCfgFrom", "(", "file", ")", "\n", "if", "err", "!=", "nil", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n\n", "for", "_", ",", "label", ":=", "range", "prefixes", "{", "p", ",", "err", ":=", "parseLabelPrefix", "(", "label", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "if", "!", "p", ".", "Ignore", "{", "cfg", ".", "whitelist", "=", "true", "\n", "}", "\n\n", "cfg", ".", "LabelPrefixes", "=", "append", "(", "cfg", ".", "LabelPrefixes", ",", "p", ")", "\n", "}", "\n\n", "validLabelPrefixes", "=", "cfg", "\n\n", "log", ".", "Info", "(", "\"", "\"", ")", "\n", "for", "_", ",", "l", ":=", "range", "validLabelPrefixes", ".", "LabelPrefixes", "{", "log", ".", "Infof", "(", "\"", "\"", ",", "l", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// ParseLabelPrefixCfg parses valid label prefixes from a file and from a slice // of valid prefixes. Both are optional. If both are provided, both list are // appended together.
[ "ParseLabelPrefixCfg", "parses", "valid", "label", "prefixes", "from", "a", "file", "and", "from", "a", "slice", "of", "valid", "prefixes", ".", "Both", "are", "optional", ".", "If", "both", "are", "provided", "both", "list", "are", "appended", "together", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/labels/filter.go#L113-L140
162,642
cilium/cilium
pkg/labels/filter.go
defaultLabelPrefixCfg
func defaultLabelPrefixCfg() *labelPrefixCfg { cfg := &labelPrefixCfg{ Version: LPCfgFileVersion, LabelPrefixes: []*LabelPrefix{}, } expressions := []string{ k8sConst.PodNamespaceLabel, // include io.kubernetes.pod.namspace k8sConst.PodNamespaceMetaLabels, // include all namespace labels "!io.kubernetes", // ignore all other io.kubernetes labels "!.*kubernetes.io", // ignore all other kubernetes.io labels (annotation.*.k8s.io) "!pod-template-generation", // ignore pod-template-generation "!pod-template-hash", // ignore pod-template-hash "!controller-revision-hash", // ignore controller-revision-hash "!annotation." + k8sConst.CiliumK8sAnnotationPrefix, // ignore all cilium annotations "!annotation." + k8sConst.CiliumIdentityAnnotationDeprecated, // ignore all cilium annotations "!annotation.sidecar.istio.io", // ignore all istio sidecar annotation labels "!annotation.etcd.version", // ignore all etcd.version annotations "!etcd_node", // ignore etcd_node label } for _, e := range expressions { p, err := parseLabelPrefix(e) if err != nil { msg := fmt.Sprintf("BUG: Unable to parse default label prefix '%s': %s", e, err) panic(msg) } cfg.LabelPrefixes = append(cfg.LabelPrefixes, p) } return cfg }
go
func defaultLabelPrefixCfg() *labelPrefixCfg { cfg := &labelPrefixCfg{ Version: LPCfgFileVersion, LabelPrefixes: []*LabelPrefix{}, } expressions := []string{ k8sConst.PodNamespaceLabel, // include io.kubernetes.pod.namspace k8sConst.PodNamespaceMetaLabels, // include all namespace labels "!io.kubernetes", // ignore all other io.kubernetes labels "!.*kubernetes.io", // ignore all other kubernetes.io labels (annotation.*.k8s.io) "!pod-template-generation", // ignore pod-template-generation "!pod-template-hash", // ignore pod-template-hash "!controller-revision-hash", // ignore controller-revision-hash "!annotation." + k8sConst.CiliumK8sAnnotationPrefix, // ignore all cilium annotations "!annotation." + k8sConst.CiliumIdentityAnnotationDeprecated, // ignore all cilium annotations "!annotation.sidecar.istio.io", // ignore all istio sidecar annotation labels "!annotation.etcd.version", // ignore all etcd.version annotations "!etcd_node", // ignore etcd_node label } for _, e := range expressions { p, err := parseLabelPrefix(e) if err != nil { msg := fmt.Sprintf("BUG: Unable to parse default label prefix '%s': %s", e, err) panic(msg) } cfg.LabelPrefixes = append(cfg.LabelPrefixes, p) } return cfg }
[ "func", "defaultLabelPrefixCfg", "(", ")", "*", "labelPrefixCfg", "{", "cfg", ":=", "&", "labelPrefixCfg", "{", "Version", ":", "LPCfgFileVersion", ",", "LabelPrefixes", ":", "[", "]", "*", "LabelPrefix", "{", "}", ",", "}", "\n\n", "expressions", ":=", "[", "]", "string", "{", "k8sConst", ".", "PodNamespaceLabel", ",", "// include io.kubernetes.pod.namspace", "k8sConst", ".", "PodNamespaceMetaLabels", ",", "// include all namespace labels", "\"", "\"", ",", "// ignore all other io.kubernetes labels", "\"", "\"", ",", "// ignore all other kubernetes.io labels (annotation.*.k8s.io)", "\"", "\"", ",", "// ignore pod-template-generation", "\"", "\"", ",", "// ignore pod-template-hash", "\"", "\"", ",", "// ignore controller-revision-hash", "\"", "\"", "+", "k8sConst", ".", "CiliumK8sAnnotationPrefix", ",", "// ignore all cilium annotations", "\"", "\"", "+", "k8sConst", ".", "CiliumIdentityAnnotationDeprecated", ",", "// ignore all cilium annotations", "\"", "\"", ",", "// ignore all istio sidecar annotation labels", "\"", "\"", ",", "// ignore all etcd.version annotations", "\"", "\"", ",", "// ignore etcd_node label", "}", "\n\n", "for", "_", ",", "e", ":=", "range", "expressions", "{", "p", ",", "err", ":=", "parseLabelPrefix", "(", "e", ")", "\n", "if", "err", "!=", "nil", "{", "msg", ":=", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "e", ",", "err", ")", "\n", "panic", "(", "msg", ")", "\n", "}", "\n", "cfg", ".", "LabelPrefixes", "=", "append", "(", "cfg", ".", "LabelPrefixes", ",", "p", ")", "\n", "}", "\n\n", "return", "cfg", "\n", "}" ]
// defaultLabelPrefixCfg returns a default LabelPrefixCfg using the latest // LPCfgFileVersion
[ "defaultLabelPrefixCfg", "returns", "a", "default", "LabelPrefixCfg", "using", "the", "latest", "LPCfgFileVersion" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/labels/filter.go#L155-L186
162,643
cilium/cilium
pkg/labels/filter.go
readLabelPrefixCfgFrom
func readLabelPrefixCfgFrom(fileName string) (*labelPrefixCfg, error) { // if not file is specified, the default is empty if fileName == "" { return defaultLabelPrefixCfg(), nil } f, err := os.Open(fileName) if err != nil { return nil, err } defer f.Close() lpc := labelPrefixCfg{} err = json.NewDecoder(f).Decode(&lpc) if err != nil { return nil, err } if lpc.Version != LPCfgFileVersion { return nil, fmt.Errorf("unsupported version %d", lpc.Version) } for _, lp := range lpc.LabelPrefixes { if lp.Prefix == "" { return nil, fmt.Errorf("invalid label prefix file: prefix was empty") } if lp.Source == "" { return nil, fmt.Errorf("invalid label prefix file: source was empty") } if !lp.Ignore { lpc.whitelist = true } } return &lpc, nil }
go
func readLabelPrefixCfgFrom(fileName string) (*labelPrefixCfg, error) { // if not file is specified, the default is empty if fileName == "" { return defaultLabelPrefixCfg(), nil } f, err := os.Open(fileName) if err != nil { return nil, err } defer f.Close() lpc := labelPrefixCfg{} err = json.NewDecoder(f).Decode(&lpc) if err != nil { return nil, err } if lpc.Version != LPCfgFileVersion { return nil, fmt.Errorf("unsupported version %d", lpc.Version) } for _, lp := range lpc.LabelPrefixes { if lp.Prefix == "" { return nil, fmt.Errorf("invalid label prefix file: prefix was empty") } if lp.Source == "" { return nil, fmt.Errorf("invalid label prefix file: source was empty") } if !lp.Ignore { lpc.whitelist = true } } return &lpc, nil }
[ "func", "readLabelPrefixCfgFrom", "(", "fileName", "string", ")", "(", "*", "labelPrefixCfg", ",", "error", ")", "{", "// if not file is specified, the default is empty", "if", "fileName", "==", "\"", "\"", "{", "return", "defaultLabelPrefixCfg", "(", ")", ",", "nil", "\n", "}", "\n\n", "f", ",", "err", ":=", "os", ".", "Open", "(", "fileName", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "defer", "f", ".", "Close", "(", ")", "\n", "lpc", ":=", "labelPrefixCfg", "{", "}", "\n", "err", "=", "json", ".", "NewDecoder", "(", "f", ")", ".", "Decode", "(", "&", "lpc", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "if", "lpc", ".", "Version", "!=", "LPCfgFileVersion", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "lpc", ".", "Version", ")", "\n", "}", "\n", "for", "_", ",", "lp", ":=", "range", "lpc", ".", "LabelPrefixes", "{", "if", "lp", ".", "Prefix", "==", "\"", "\"", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "lp", ".", "Source", "==", "\"", "\"", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "!", "lp", ".", "Ignore", "{", "lpc", ".", "whitelist", "=", "true", "\n", "}", "\n", "}", "\n", "return", "&", "lpc", ",", "nil", "\n", "}" ]
// readLabelPrefixCfgFrom reads a label prefix configuration file from fileName. If the // version is not supported by us it returns an error.
[ "readLabelPrefixCfgFrom", "reads", "a", "label", "prefix", "configuration", "file", "from", "fileName", ".", "If", "the", "version", "is", "not", "supported", "by", "us", "it", "returns", "an", "error", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/labels/filter.go#L190-L221
162,644
cilium/cilium
pkg/bpf/bpf.go
GetPreAllocateMapFlags
func GetPreAllocateMapFlags(t MapType) uint32 { switch { case !t.allowsPreallocation(): return BPF_F_NO_PREALLOC case t.requiresPreallocation(): return 0 } return atomic.LoadUint32(&preAllocateMapSetting) }
go
func GetPreAllocateMapFlags(t MapType) uint32 { switch { case !t.allowsPreallocation(): return BPF_F_NO_PREALLOC case t.requiresPreallocation(): return 0 } return atomic.LoadUint32(&preAllocateMapSetting) }
[ "func", "GetPreAllocateMapFlags", "(", "t", "MapType", ")", "uint32", "{", "switch", "{", "case", "!", "t", ".", "allowsPreallocation", "(", ")", ":", "return", "BPF_F_NO_PREALLOC", "\n", "case", "t", ".", "requiresPreallocation", "(", ")", ":", "return", "0", "\n", "}", "\n", "return", "atomic", ".", "LoadUint32", "(", "&", "preAllocateMapSetting", ")", "\n", "}" ]
// GetPreAllocateMapFlags returns the map flags for map which use conditional // pre-allocation.
[ "GetPreAllocateMapFlags", "returns", "the", "map", "flags", "for", "map", "which", "use", "conditional", "pre", "-", "allocation", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/bpf/bpf.go#L115-L123
162,645
cilium/cilium
api/v1/server/restapi/daemon/get_config.go
NewGetConfig
func NewGetConfig(ctx *middleware.Context, handler GetConfigHandler) *GetConfig { return &GetConfig{Context: ctx, Handler: handler} }
go
func NewGetConfig(ctx *middleware.Context, handler GetConfigHandler) *GetConfig { return &GetConfig{Context: ctx, Handler: handler} }
[ "func", "NewGetConfig", "(", "ctx", "*", "middleware", ".", "Context", ",", "handler", "GetConfigHandler", ")", "*", "GetConfig", "{", "return", "&", "GetConfig", "{", "Context", ":", "ctx", ",", "Handler", ":", "handler", "}", "\n", "}" ]
// NewGetConfig creates a new http.Handler for the get config operation
[ "NewGetConfig", "creates", "a", "new", "http", ".", "Handler", "for", "the", "get", "config", "operation" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/server/restapi/daemon/get_config.go#L28-L30
162,646
cilium/cilium
pkg/policy/l4.go
HasL3DependentL7Rules
func (l4 *L4Filter) HasL3DependentL7Rules() bool { switch len(l4.L7RulesPerEp) { case 0: // No L7 rules. return false case 1: // If L3 is wildcarded, this filter corresponds to L4-only rule(s). _, ok := l4.L7RulesPerEp[api.WildcardEndpointSelector] return !ok default: return true } }
go
func (l4 *L4Filter) HasL3DependentL7Rules() bool { switch len(l4.L7RulesPerEp) { case 0: // No L7 rules. return false case 1: // If L3 is wildcarded, this filter corresponds to L4-only rule(s). _, ok := l4.L7RulesPerEp[api.WildcardEndpointSelector] return !ok default: return true } }
[ "func", "(", "l4", "*", "L4Filter", ")", "HasL3DependentL7Rules", "(", ")", "bool", "{", "switch", "len", "(", "l4", ".", "L7RulesPerEp", ")", "{", "case", "0", ":", "// No L7 rules.", "return", "false", "\n", "case", "1", ":", "// If L3 is wildcarded, this filter corresponds to L4-only rule(s).", "_", ",", "ok", ":=", "l4", ".", "L7RulesPerEp", "[", "api", ".", "WildcardEndpointSelector", "]", "\n", "return", "!", "ok", "\n", "default", ":", "return", "true", "\n", "}", "\n", "}" ]
// HasL3DependentL7Rules returns true if this L4Filter is created from rules // that require an L3 match as well as specific L7 rules.
[ "HasL3DependentL7Rules", "returns", "true", "if", "this", "L4Filter", "is", "created", "from", "rules", "that", "require", "an", "L3", "match", "as", "well", "as", "specific", "L7", "rules", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/l4.go#L127-L139
162,647
cilium/cilium
pkg/policy/l4.go
ToKeys
func (l4 *L4Filter) ToKeys(direction trafficdirection.TrafficDirection, identityCache cache.IdentityCache, deniedIdentities cache.IdentityCache) []Key { keysToAdd := []Key{} port := uint16(l4.Port) proto := uint8(l4.U8Proto) // The BPF datapath only supports a value of '0' for identity (wildcarding // at L3) if there is a corresponding port (i.e., a non-zero port). // Wildcarding at L3 and L4 at the same time is not understood by the // datapath at this time. So, if we have L3-only policy (e.g., port == 0), // we need to explicitly allow each identity at port 0. if l4.AllowsAllAtL3() && l4.Port != 0 { keyToAdd := Key{ Identity: 0, // NOTE: Port is in host byte-order! DestPort: port, Nexthdr: proto, TrafficDirection: direction.Uint8(), } keysToAdd = append(keysToAdd, keyToAdd) if !l4.HasL3DependentL7Rules() { return keysToAdd } // else we need to calculate all L3-dependent L4 peers below. } for _, sel := range l4.Endpoints { identities := getSecurityIdentities(identityCache, &sel) for _, id := range identities { if _, identityIsDenied := deniedIdentities[id]; !identityIsDenied { srcID := id.Uint32() keyToAdd := Key{ Identity: srcID, // NOTE: Port is in host byte-order! DestPort: port, Nexthdr: proto, TrafficDirection: direction.Uint8(), } keysToAdd = append(keysToAdd, keyToAdd) } } } return keysToAdd }
go
func (l4 *L4Filter) ToKeys(direction trafficdirection.TrafficDirection, identityCache cache.IdentityCache, deniedIdentities cache.IdentityCache) []Key { keysToAdd := []Key{} port := uint16(l4.Port) proto := uint8(l4.U8Proto) // The BPF datapath only supports a value of '0' for identity (wildcarding // at L3) if there is a corresponding port (i.e., a non-zero port). // Wildcarding at L3 and L4 at the same time is not understood by the // datapath at this time. So, if we have L3-only policy (e.g., port == 0), // we need to explicitly allow each identity at port 0. if l4.AllowsAllAtL3() && l4.Port != 0 { keyToAdd := Key{ Identity: 0, // NOTE: Port is in host byte-order! DestPort: port, Nexthdr: proto, TrafficDirection: direction.Uint8(), } keysToAdd = append(keysToAdd, keyToAdd) if !l4.HasL3DependentL7Rules() { return keysToAdd } // else we need to calculate all L3-dependent L4 peers below. } for _, sel := range l4.Endpoints { identities := getSecurityIdentities(identityCache, &sel) for _, id := range identities { if _, identityIsDenied := deniedIdentities[id]; !identityIsDenied { srcID := id.Uint32() keyToAdd := Key{ Identity: srcID, // NOTE: Port is in host byte-order! DestPort: port, Nexthdr: proto, TrafficDirection: direction.Uint8(), } keysToAdd = append(keysToAdd, keyToAdd) } } } return keysToAdd }
[ "func", "(", "l4", "*", "L4Filter", ")", "ToKeys", "(", "direction", "trafficdirection", ".", "TrafficDirection", ",", "identityCache", "cache", ".", "IdentityCache", ",", "deniedIdentities", "cache", ".", "IdentityCache", ")", "[", "]", "Key", "{", "keysToAdd", ":=", "[", "]", "Key", "{", "}", "\n", "port", ":=", "uint16", "(", "l4", ".", "Port", ")", "\n", "proto", ":=", "uint8", "(", "l4", ".", "U8Proto", ")", "\n\n", "// The BPF datapath only supports a value of '0' for identity (wildcarding", "// at L3) if there is a corresponding port (i.e., a non-zero port).", "// Wildcarding at L3 and L4 at the same time is not understood by the", "// datapath at this time. So, if we have L3-only policy (e.g., port == 0),", "// we need to explicitly allow each identity at port 0.", "if", "l4", ".", "AllowsAllAtL3", "(", ")", "&&", "l4", ".", "Port", "!=", "0", "{", "keyToAdd", ":=", "Key", "{", "Identity", ":", "0", ",", "// NOTE: Port is in host byte-order!", "DestPort", ":", "port", ",", "Nexthdr", ":", "proto", ",", "TrafficDirection", ":", "direction", ".", "Uint8", "(", ")", ",", "}", "\n", "keysToAdd", "=", "append", "(", "keysToAdd", ",", "keyToAdd", ")", "\n", "if", "!", "l4", ".", "HasL3DependentL7Rules", "(", ")", "{", "return", "keysToAdd", "\n", "}", "// else we need to calculate all L3-dependent L4 peers below.", "\n", "}", "\n\n", "for", "_", ",", "sel", ":=", "range", "l4", ".", "Endpoints", "{", "identities", ":=", "getSecurityIdentities", "(", "identityCache", ",", "&", "sel", ")", "\n", "for", "_", ",", "id", ":=", "range", "identities", "{", "if", "_", ",", "identityIsDenied", ":=", "deniedIdentities", "[", "id", "]", ";", "!", "identityIsDenied", "{", "srcID", ":=", "id", ".", "Uint32", "(", ")", "\n", "keyToAdd", ":=", "Key", "{", "Identity", ":", "srcID", ",", "// NOTE: Port is in host byte-order!", "DestPort", ":", "port", ",", "Nexthdr", ":", "proto", ",", "TrafficDirection", ":", "direction", ".", "Uint8", "(", ")", ",", "}", "\n", "keysToAdd", "=", "append", "(", "keysToAdd", ",", "keyToAdd", ")", "\n", "}", "\n", "}", "\n", "}", "\n\n", "return", "keysToAdd", "\n", "}" ]
// ToKeys converts filter into a list of Keys.
[ "ToKeys", "converts", "filter", "into", "a", "list", "of", "Keys", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/l4.go#L142-L184
162,648
cilium/cilium
pkg/policy/l4.go
MarshalIndent
func (l4 *L4Filter) MarshalIndent() string { b, err := json.MarshalIndent(l4, "", " ") if err != nil { b = []byte("\"L4Filter error: " + err.Error() + "\"") } return string(b) }
go
func (l4 *L4Filter) MarshalIndent() string { b, err := json.MarshalIndent(l4, "", " ") if err != nil { b = []byte("\"L4Filter error: " + err.Error() + "\"") } return string(b) }
[ "func", "(", "l4", "*", "L4Filter", ")", "MarshalIndent", "(", ")", "string", "{", "b", ",", "err", ":=", "json", ".", "MarshalIndent", "(", "l4", ",", "\"", "\"", ",", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "b", "=", "[", "]", "byte", "(", "\"", "\\\"", "\"", "+", "err", ".", "Error", "(", ")", "+", "\"", "\\\"", "\"", ")", "\n", "}", "\n", "return", "string", "(", "b", ")", "\n", "}" ]
// MarshalIndent returns the `L4Filter` in indented JSON string.
[ "MarshalIndent", "returns", "the", "L4Filter", "in", "indented", "JSON", "string", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/l4.go#L322-L328
162,649
cilium/cilium
pkg/policy/l4.go
String
func (l4 L4Filter) String() string { b, err := json.Marshal(l4) if err != nil { return err.Error() } return string(b) }
go
func (l4 L4Filter) String() string { b, err := json.Marshal(l4) if err != nil { return err.Error() } return string(b) }
[ "func", "(", "l4", "L4Filter", ")", "String", "(", ")", "string", "{", "b", ",", "err", ":=", "json", ".", "Marshal", "(", "l4", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", ".", "Error", "(", ")", "\n", "}", "\n", "return", "string", "(", "b", ")", "\n", "}" ]
// String returns the `L4Filter` in a human-readable string.
[ "String", "returns", "the", "L4Filter", "in", "a", "human", "-", "readable", "string", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/l4.go#L331-L337
162,650
cilium/cilium
pkg/policy/l4.go
HasRedirect
func (l4 L4PolicyMap) HasRedirect() bool { for _, f := range l4 { if f.IsRedirect() { return true } } return false }
go
func (l4 L4PolicyMap) HasRedirect() bool { for _, f := range l4 { if f.IsRedirect() { return true } } return false }
[ "func", "(", "l4", "L4PolicyMap", ")", "HasRedirect", "(", ")", "bool", "{", "for", "_", ",", "f", ":=", "range", "l4", "{", "if", "f", ".", "IsRedirect", "(", ")", "{", "return", "true", "\n", "}", "\n", "}", "\n\n", "return", "false", "\n", "}" ]
// HasRedirect returns true if at least one L4 filter contains a port // redirection
[ "HasRedirect", "returns", "true", "if", "at", "least", "one", "L4", "filter", "contains", "a", "port", "redirection" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/l4.go#L361-L369
162,651
cilium/cilium
pkg/policy/l4.go
IngressCoversContext
func (l4 *L4PolicyMap) IngressCoversContext(ctx *SearchContext) api.Decision { return l4.containsAllL3L4(ctx.From, ctx.DPorts) }
go
func (l4 *L4PolicyMap) IngressCoversContext(ctx *SearchContext) api.Decision { return l4.containsAllL3L4(ctx.From, ctx.DPorts) }
[ "func", "(", "l4", "*", "L4PolicyMap", ")", "IngressCoversContext", "(", "ctx", "*", "SearchContext", ")", "api", ".", "Decision", "{", "return", "l4", ".", "containsAllL3L4", "(", "ctx", ".", "From", ",", "ctx", ".", "DPorts", ")", "\n", "}" ]
// IngressCoversContext checks if the receiver's ingress L4Policy contains // all `dPorts` and `labels`.
[ "IngressCoversContext", "checks", "if", "the", "receiver", "s", "ingress", "L4Policy", "contains", "all", "dPorts", "and", "labels", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/l4.go#L438-L440
162,652
cilium/cilium
pkg/policy/l4.go
EgressCoversContext
func (l4 *L4PolicyMap) EgressCoversContext(ctx *SearchContext) api.Decision { return l4.containsAllL3L4(ctx.To, ctx.DPorts) }
go
func (l4 *L4PolicyMap) EgressCoversContext(ctx *SearchContext) api.Decision { return l4.containsAllL3L4(ctx.To, ctx.DPorts) }
[ "func", "(", "l4", "*", "L4PolicyMap", ")", "EgressCoversContext", "(", "ctx", "*", "SearchContext", ")", "api", ".", "Decision", "{", "return", "l4", ".", "containsAllL3L4", "(", "ctx", ".", "To", ",", "ctx", ".", "DPorts", ")", "\n", "}" ]
// EgressCoversContext checks if the receiver's egress L4Policy contains // all `dPorts` and `labels`.
[ "EgressCoversContext", "checks", "if", "the", "receiver", "s", "egress", "L4Policy", "contains", "all", "dPorts", "and", "labels", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/l4.go#L444-L446
162,653
cilium/cilium
pkg/policy/l4.go
HasRedirect
func (l4 *L4Policy) HasRedirect() bool { return l4 != nil && (l4.Ingress.HasRedirect() || l4.Egress.HasRedirect()) }
go
func (l4 *L4Policy) HasRedirect() bool { return l4 != nil && (l4.Ingress.HasRedirect() || l4.Egress.HasRedirect()) }
[ "func", "(", "l4", "*", "L4Policy", ")", "HasRedirect", "(", ")", "bool", "{", "return", "l4", "!=", "nil", "&&", "(", "l4", ".", "Ingress", ".", "HasRedirect", "(", ")", "||", "l4", ".", "Egress", ".", "HasRedirect", "(", ")", ")", "\n", "}" ]
// HasRedirect returns true if the L4 policy contains at least one port redirection
[ "HasRedirect", "returns", "true", "if", "the", "L4", "policy", "contains", "at", "least", "one", "port", "redirection" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/l4.go#L449-L451
162,654
cilium/cilium
pkg/policy/l4.go
RequiresConntrack
func (l4 *L4Policy) RequiresConntrack() bool { return l4 != nil && (len(l4.Ingress) > 0 || len(l4.Egress) > 0) }
go
func (l4 *L4Policy) RequiresConntrack() bool { return l4 != nil && (len(l4.Ingress) > 0 || len(l4.Egress) > 0) }
[ "func", "(", "l4", "*", "L4Policy", ")", "RequiresConntrack", "(", ")", "bool", "{", "return", "l4", "!=", "nil", "&&", "(", "len", "(", "l4", ".", "Ingress", ")", ">", "0", "||", "len", "(", "l4", ".", "Egress", ")", ">", "0", ")", "\n", "}" ]
// RequiresConntrack returns true if if the L4 configuration requires // connection tracking to be enabled.
[ "RequiresConntrack", "returns", "true", "if", "if", "the", "L4", "configuration", "requires", "connection", "tracking", "to", "be", "enabled", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/l4.go#L455-L457
162,655
cilium/cilium
api/v1/client/service/put_service_id_parameters.go
WithTimeout
func (o *PutServiceIDParams) WithTimeout(timeout time.Duration) *PutServiceIDParams { o.SetTimeout(timeout) return o }
go
func (o *PutServiceIDParams) WithTimeout(timeout time.Duration) *PutServiceIDParams { o.SetTimeout(timeout) return o }
[ "func", "(", "o", "*", "PutServiceIDParams", ")", "WithTimeout", "(", "timeout", "time", ".", "Duration", ")", "*", "PutServiceIDParams", "{", "o", ".", "SetTimeout", "(", "timeout", ")", "\n", "return", "o", "\n", "}" ]
// WithTimeout adds the timeout to the put service ID params
[ "WithTimeout", "adds", "the", "timeout", "to", "the", "put", "service", "ID", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/service/put_service_id_parameters.go#L84-L87
162,656
cilium/cilium
api/v1/client/service/put_service_id_parameters.go
WithContext
func (o *PutServiceIDParams) WithContext(ctx context.Context) *PutServiceIDParams { o.SetContext(ctx) return o }
go
func (o *PutServiceIDParams) WithContext(ctx context.Context) *PutServiceIDParams { o.SetContext(ctx) return o }
[ "func", "(", "o", "*", "PutServiceIDParams", ")", "WithContext", "(", "ctx", "context", ".", "Context", ")", "*", "PutServiceIDParams", "{", "o", ".", "SetContext", "(", "ctx", ")", "\n", "return", "o", "\n", "}" ]
// WithContext adds the context to the put service ID params
[ "WithContext", "adds", "the", "context", "to", "the", "put", "service", "ID", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/service/put_service_id_parameters.go#L95-L98
162,657
cilium/cilium
api/v1/client/service/put_service_id_parameters.go
WithHTTPClient
func (o *PutServiceIDParams) WithHTTPClient(client *http.Client) *PutServiceIDParams { o.SetHTTPClient(client) return o }
go
func (o *PutServiceIDParams) WithHTTPClient(client *http.Client) *PutServiceIDParams { o.SetHTTPClient(client) return o }
[ "func", "(", "o", "*", "PutServiceIDParams", ")", "WithHTTPClient", "(", "client", "*", "http", ".", "Client", ")", "*", "PutServiceIDParams", "{", "o", ".", "SetHTTPClient", "(", "client", ")", "\n", "return", "o", "\n", "}" ]
// WithHTTPClient adds the HTTPClient to the put service ID params
[ "WithHTTPClient", "adds", "the", "HTTPClient", "to", "the", "put", "service", "ID", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/service/put_service_id_parameters.go#L106-L109
162,658
cilium/cilium
api/v1/client/service/put_service_id_parameters.go
WithConfig
func (o *PutServiceIDParams) WithConfig(config *models.ServiceSpec) *PutServiceIDParams { o.SetConfig(config) return o }
go
func (o *PutServiceIDParams) WithConfig(config *models.ServiceSpec) *PutServiceIDParams { o.SetConfig(config) return o }
[ "func", "(", "o", "*", "PutServiceIDParams", ")", "WithConfig", "(", "config", "*", "models", ".", "ServiceSpec", ")", "*", "PutServiceIDParams", "{", "o", ".", "SetConfig", "(", "config", ")", "\n", "return", "o", "\n", "}" ]
// WithConfig adds the config to the put service ID params
[ "WithConfig", "adds", "the", "config", "to", "the", "put", "service", "ID", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/service/put_service_id_parameters.go#L117-L120
162,659
cilium/cilium
api/v1/client/service/put_service_id_parameters.go
WithID
func (o *PutServiceIDParams) WithID(id int64) *PutServiceIDParams { o.SetID(id) return o }
go
func (o *PutServiceIDParams) WithID(id int64) *PutServiceIDParams { o.SetID(id) return o }
[ "func", "(", "o", "*", "PutServiceIDParams", ")", "WithID", "(", "id", "int64", ")", "*", "PutServiceIDParams", "{", "o", ".", "SetID", "(", "id", ")", "\n", "return", "o", "\n", "}" ]
// WithID adds the id to the put service ID params
[ "WithID", "adds", "the", "id", "to", "the", "put", "service", "ID", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/service/put_service_id_parameters.go#L128-L131
162,660
cilium/cilium
pkg/fqdn/regexpmap/regexp_map.go
NewRegexpList
func NewRegexpList(initialValues ...string) (result *RegexpList) { sort.Slice(initialValues, func(i, j int) bool { return len(initialValues[i]) < len(initialValues[j]) }) tmp := RegexpList(initialValues) return &tmp }
go
func NewRegexpList(initialValues ...string) (result *RegexpList) { sort.Slice(initialValues, func(i, j int) bool { return len(initialValues[i]) < len(initialValues[j]) }) tmp := RegexpList(initialValues) return &tmp }
[ "func", "NewRegexpList", "(", "initialValues", "...", "string", ")", "(", "result", "*", "RegexpList", ")", "{", "sort", ".", "Slice", "(", "initialValues", ",", "func", "(", "i", ",", "j", "int", ")", "bool", "{", "return", "len", "(", "initialValues", "[", "i", "]", ")", "<", "len", "(", "initialValues", "[", "j", "]", ")", "\n", "}", ")", "\n\n", "tmp", ":=", "RegexpList", "(", "initialValues", ")", "\n", "return", "&", "tmp", "\n", "}" ]
// NewRegexpList returns a new RegexpList, if any initialValues is in place // will add into the utility.
[ "NewRegexpList", "returns", "a", "new", "RegexpList", "if", "any", "initialValues", "is", "in", "place", "will", "add", "into", "the", "utility", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/fqdn/regexpmap/regexp_map.go#L28-L35
162,661
cilium/cilium
pkg/fqdn/regexpmap/regexp_map.go
Add
func (r *RegexpList) Add(val string) { for _, item := range *r { if item == val { return } } tmpData := append(*r, val) sort.Slice(tmpData, func(i, j int) bool { return len(tmpData[i]) < len(tmpData[j]) }) *r = tmpData }
go
func (r *RegexpList) Add(val string) { for _, item := range *r { if item == val { return } } tmpData := append(*r, val) sort.Slice(tmpData, func(i, j int) bool { return len(tmpData[i]) < len(tmpData[j]) }) *r = tmpData }
[ "func", "(", "r", "*", "RegexpList", ")", "Add", "(", "val", "string", ")", "{", "for", "_", ",", "item", ":=", "range", "*", "r", "{", "if", "item", "==", "val", "{", "return", "\n", "}", "\n", "}", "\n\n", "tmpData", ":=", "append", "(", "*", "r", ",", "val", ")", "\n\n", "sort", ".", "Slice", "(", "tmpData", ",", "func", "(", "i", ",", "j", "int", ")", "bool", "{", "return", "len", "(", "tmpData", "[", "i", "]", ")", "<", "len", "(", "tmpData", "[", "j", "]", ")", "\n", "}", ")", "\n\n", "*", "r", "=", "tmpData", "\n", "}" ]
// Add function adds a new item in the list and sort the data based on the // length
[ "Add", "function", "adds", "a", "new", "item", "in", "the", "list", "and", "sort", "the", "data", "based", "on", "the", "length" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/fqdn/regexpmap/regexp_map.go#L39-L53
162,662
cilium/cilium
pkg/fqdn/regexpmap/regexp_map.go
Remove
func (r *RegexpList) Remove(val string) { tmpData := []string{} for _, item := range *r { if item == val { continue } tmpData = append(tmpData, item) } *r = tmpData return }
go
func (r *RegexpList) Remove(val string) { tmpData := []string{} for _, item := range *r { if item == val { continue } tmpData = append(tmpData, item) } *r = tmpData return }
[ "func", "(", "r", "*", "RegexpList", ")", "Remove", "(", "val", "string", ")", "{", "tmpData", ":=", "[", "]", "string", "{", "}", "\n", "for", "_", ",", "item", ":=", "range", "*", "r", "{", "if", "item", "==", "val", "{", "continue", "\n", "}", "\n", "tmpData", "=", "append", "(", "tmpData", ",", "item", ")", "\n", "}", "\n", "*", "r", "=", "tmpData", "\n", "return", "\n", "}" ]
// Remove removes the item from the internal array and keep the data sorted
[ "Remove", "removes", "the", "item", "from", "the", "internal", "array", "and", "keep", "the", "data", "sorted" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/fqdn/regexpmap/regexp_map.go#L56-L66
162,663
cilium/cilium
pkg/fqdn/regexpmap/regexp_map.go
Increment
func (r refCount) Increment(key string) int { r[key]++ return r[key] }
go
func (r refCount) Increment(key string) int { r[key]++ return r[key] }
[ "func", "(", "r", "refCount", ")", "Increment", "(", "key", "string", ")", "int", "{", "r", "[", "key", "]", "++", "\n", "return", "r", "[", "key", "]", "\n", "}" ]
// Increment adds one to the given key
[ "Increment", "adds", "one", "to", "the", "given", "key" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/fqdn/regexpmap/regexp_map.go#L82-L85
162,664
cilium/cilium
pkg/fqdn/regexpmap/regexp_map.go
Decrement
func (r refCount) Decrement(key string) int { val := r[key] if val <= 1 { delete(r, key) return 0 } r[key]-- return r[key] }
go
func (r refCount) Decrement(key string) int { val := r[key] if val <= 1 { delete(r, key) return 0 } r[key]-- return r[key] }
[ "func", "(", "r", "refCount", ")", "Decrement", "(", "key", "string", ")", "int", "{", "val", ":=", "r", "[", "key", "]", "\n", "if", "val", "<=", "1", "{", "delete", "(", "r", ",", "key", ")", "\n", "return", "0", "\n", "}", "\n", "r", "[", "key", "]", "--", "\n", "return", "r", "[", "key", "]", "\n", "}" ]
// Decrement remove one to the given key. If the value is 0, the key will be // deleted.
[ "Decrement", "remove", "one", "to", "the", "given", "key", ".", "If", "the", "value", "is", "0", "the", "key", "will", "be", "deleted", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/fqdn/regexpmap/regexp_map.go#L89-L97
162,665
cilium/cilium
pkg/fqdn/regexpmap/regexp_map.go
Keys
func (r refCount) Keys() []string { result := make([]string, len(r)) position := 0 for key := range r { result[position] = key position++ } return result }
go
func (r refCount) Keys() []string { result := make([]string, len(r)) position := 0 for key := range r { result[position] = key position++ } return result }
[ "func", "(", "r", "refCount", ")", "Keys", "(", ")", "[", "]", "string", "{", "result", ":=", "make", "(", "[", "]", "string", ",", "len", "(", "r", ")", ")", "\n", "position", ":=", "0", "\n", "for", "key", ":=", "range", "r", "{", "result", "[", "position", "]", "=", "key", "\n", "position", "++", "\n", "}", "\n", "return", "result", "\n", "}" ]
// Keys return the list of keys that are in place.
[ "Keys", "return", "the", "list", "of", "keys", "that", "are", "in", "place", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/fqdn/regexpmap/regexp_map.go#L100-L108
162,666
cilium/cilium
pkg/fqdn/regexpmap/regexp_map.go
NewRegexpMap
func NewRegexpMap() *RegexpMap { return &RegexpMap{ lookupValues: make(map[string]*RegexpList), rules: make(map[string]*regexp.Regexp), rulesRelation: make(map[string]refCount), } }
go
func NewRegexpMap() *RegexpMap { return &RegexpMap{ lookupValues: make(map[string]*RegexpList), rules: make(map[string]*regexp.Regexp), rulesRelation: make(map[string]refCount), } }
[ "func", "NewRegexpMap", "(", ")", "*", "RegexpMap", "{", "return", "&", "RegexpMap", "{", "lookupValues", ":", "make", "(", "map", "[", "string", "]", "*", "RegexpList", ")", ",", "rules", ":", "make", "(", "map", "[", "string", "]", "*", "regexp", ".", "Regexp", ")", ",", "rulesRelation", ":", "make", "(", "map", "[", "string", "]", "refCount", ")", ",", "}", "\n", "}" ]
// NewRegexpMap returns an initialized RegexpMap
[ "NewRegexpMap", "returns", "an", "initialized", "RegexpMap" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/fqdn/regexpmap/regexp_map.go#L140-L146
162,667
cilium/cilium
pkg/fqdn/regexpmap/regexp_map.go
Add
func (m *RegexpMap) Add(reStr string, lookupValue string) error { _, exists := m.rules[reStr] if !exists { rule, err := regexp.Compile(reStr) if err != nil { return err } m.rules[reStr] = rule } val, exists := m.lookupValues[lookupValue] if !exists { val = NewRegexpList() m.lookupValues[lookupValue] = val } val.Add(reStr) lookupCount, exists := m.rulesRelation[reStr] if !exists { lookupCount = refCount{} m.rulesRelation[reStr] = lookupCount } lookupCount.Increment(lookupValue) return nil }
go
func (m *RegexpMap) Add(reStr string, lookupValue string) error { _, exists := m.rules[reStr] if !exists { rule, err := regexp.Compile(reStr) if err != nil { return err } m.rules[reStr] = rule } val, exists := m.lookupValues[lookupValue] if !exists { val = NewRegexpList() m.lookupValues[lookupValue] = val } val.Add(reStr) lookupCount, exists := m.rulesRelation[reStr] if !exists { lookupCount = refCount{} m.rulesRelation[reStr] = lookupCount } lookupCount.Increment(lookupValue) return nil }
[ "func", "(", "m", "*", "RegexpMap", ")", "Add", "(", "reStr", "string", ",", "lookupValue", "string", ")", "error", "{", "_", ",", "exists", ":=", "m", ".", "rules", "[", "reStr", "]", "\n", "if", "!", "exists", "{", "rule", ",", "err", ":=", "regexp", ".", "Compile", "(", "reStr", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "m", ".", "rules", "[", "reStr", "]", "=", "rule", "\n", "}", "\n", "val", ",", "exists", ":=", "m", ".", "lookupValues", "[", "lookupValue", "]", "\n", "if", "!", "exists", "{", "val", "=", "NewRegexpList", "(", ")", "\n", "m", ".", "lookupValues", "[", "lookupValue", "]", "=", "val", "\n", "}", "\n", "val", ".", "Add", "(", "reStr", ")", "\n\n", "lookupCount", ",", "exists", ":=", "m", ".", "rulesRelation", "[", "reStr", "]", "\n", "if", "!", "exists", "{", "lookupCount", "=", "refCount", "{", "}", "\n", "m", ".", "rulesRelation", "[", "reStr", "]", "=", "lookupCount", "\n", "}", "\n", "lookupCount", ".", "Increment", "(", "lookupValue", ")", "\n", "return", "nil", "\n", "}" ]
// Add associates a Regular expression to a lookupValue that will be used in // the lookup functions. It will return an error and data will be not saved if // the regexp does not compile correctly
[ "Add", "associates", "a", "Regular", "expression", "to", "a", "lookupValue", "that", "will", "be", "used", "in", "the", "lookup", "functions", ".", "It", "will", "return", "an", "error", "and", "data", "will", "be", "not", "saved", "if", "the", "regexp", "does", "not", "compile", "correctly" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/fqdn/regexpmap/regexp_map.go#L151-L174
162,668
cilium/cilium
pkg/fqdn/regexpmap/regexp_map.go
LookupValues
func (m *RegexpMap) LookupValues(lookupKey string) (lookupValues []string) { for reStr, rule := range m.rules { if !rule.MatchString(lookupKey) { continue } val, exists := m.rulesRelation[reStr] if exists { lookupValues = append(lookupValues, val.Keys()...) } } return keepUniqueStrings(lookupValues) }
go
func (m *RegexpMap) LookupValues(lookupKey string) (lookupValues []string) { for reStr, rule := range m.rules { if !rule.MatchString(lookupKey) { continue } val, exists := m.rulesRelation[reStr] if exists { lookupValues = append(lookupValues, val.Keys()...) } } return keepUniqueStrings(lookupValues) }
[ "func", "(", "m", "*", "RegexpMap", ")", "LookupValues", "(", "lookupKey", "string", ")", "(", "lookupValues", "[", "]", "string", ")", "{", "for", "reStr", ",", "rule", ":=", "range", "m", ".", "rules", "{", "if", "!", "rule", ".", "MatchString", "(", "lookupKey", ")", "{", "continue", "\n", "}", "\n", "val", ",", "exists", ":=", "m", ".", "rulesRelation", "[", "reStr", "]", "\n", "if", "exists", "{", "lookupValues", "=", "append", "(", "lookupValues", ",", "val", ".", "Keys", "(", ")", "...", ")", "\n", "}", "\n", "}", "\n", "return", "keepUniqueStrings", "(", "lookupValues", ")", "\n", "}" ]
// LookupValues returns all lookupValues, inserted via Add, where the reStr // matches lookupKey
[ "LookupValues", "returns", "all", "lookupValues", "inserted", "via", "Add", "where", "the", "reStr", "matches", "lookupKey" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/fqdn/regexpmap/regexp_map.go#L178-L190
162,669
cilium/cilium
pkg/fqdn/regexpmap/regexp_map.go
LookupContainsValue
func (m *RegexpMap) LookupContainsValue(lookupKey, expectedValue string) (found bool) { val, exists := m.lookupValues[expectedValue] if !exists { return false } for _, item := range val.Get() { rule := m.rules[item] if rule != nil && rule.MatchString(lookupKey) { return true } } return false }
go
func (m *RegexpMap) LookupContainsValue(lookupKey, expectedValue string) (found bool) { val, exists := m.lookupValues[expectedValue] if !exists { return false } for _, item := range val.Get() { rule := m.rules[item] if rule != nil && rule.MatchString(lookupKey) { return true } } return false }
[ "func", "(", "m", "*", "RegexpMap", ")", "LookupContainsValue", "(", "lookupKey", ",", "expectedValue", "string", ")", "(", "found", "bool", ")", "{", "val", ",", "exists", ":=", "m", ".", "lookupValues", "[", "expectedValue", "]", "\n", "if", "!", "exists", "{", "return", "false", "\n", "}", "\n\n", "for", "_", ",", "item", ":=", "range", "val", ".", "Get", "(", ")", "{", "rule", ":=", "m", ".", "rules", "[", "item", "]", "\n", "if", "rule", "!=", "nil", "&&", "rule", ".", "MatchString", "(", "lookupKey", ")", "{", "return", "true", "\n", "}", "\n", "}", "\n", "return", "false", "\n", "}" ]
// LookupContainsValue returns true if any reStr in lookups, inserted via Add, // matches lookupKey AND has a lookupValue, inserted via the same Add, that // matches expectedValue.
[ "LookupContainsValue", "returns", "true", "if", "any", "reStr", "in", "lookups", "inserted", "via", "Add", "matches", "lookupKey", "AND", "has", "a", "lookupValue", "inserted", "via", "the", "same", "Add", "that", "matches", "expectedValue", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/fqdn/regexpmap/regexp_map.go#L195-L208
162,670
cilium/cilium
pkg/fqdn/regexpmap/regexp_map.go
GetPrecompiledRegexp
func (m *RegexpMap) GetPrecompiledRegexp(reStr string) (re *regexp.Regexp) { return m.rules[reStr] }
go
func (m *RegexpMap) GetPrecompiledRegexp(reStr string) (re *regexp.Regexp) { return m.rules[reStr] }
[ "func", "(", "m", "*", "RegexpMap", ")", "GetPrecompiledRegexp", "(", "reStr", "string", ")", "(", "re", "*", "regexp", ".", "Regexp", ")", "{", "return", "m", ".", "rules", "[", "reStr", "]", "\n", "}" ]
// GetPrecompiledRegexp returns the regexp matching reStr if it is in the map. // This is a utility function to avoid recompiling regexps repeatedly, and the // RegexpMap keeps the refcount for us.
[ "GetPrecompiledRegexp", "returns", "the", "regexp", "matching", "reStr", "if", "it", "is", "in", "the", "map", ".", "This", "is", "a", "utility", "function", "to", "avoid", "recompiling", "regexps", "repeatedly", "and", "the", "RegexpMap", "keeps", "the", "refcount", "for", "us", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/fqdn/regexpmap/regexp_map.go#L241-L243
162,671
cilium/cilium
pkg/fqdn/regexpmap/regexp_map.go
keepUniqueStrings
func keepUniqueStrings(s []string) []string { sort.Strings(s) out := s[:0] // len==0 but cap==cap(ips) for readIdx, str := range s { if len(out) == 0 || out[len(out)-1] != s[readIdx] { out = append(out, str) } } return out }
go
func keepUniqueStrings(s []string) []string { sort.Strings(s) out := s[:0] // len==0 but cap==cap(ips) for readIdx, str := range s { if len(out) == 0 || out[len(out)-1] != s[readIdx] { out = append(out, str) } } return out }
[ "func", "keepUniqueStrings", "(", "s", "[", "]", "string", ")", "[", "]", "string", "{", "sort", ".", "Strings", "(", "s", ")", "\n\n", "out", ":=", "s", "[", ":", "0", "]", "// len==0 but cap==cap(ips)", "\n", "for", "readIdx", ",", "str", ":=", "range", "s", "{", "if", "len", "(", "out", ")", "==", "0", "||", "out", "[", "len", "(", "out", ")", "-", "1", "]", "!=", "s", "[", "readIdx", "]", "{", "out", "=", "append", "(", "out", ",", "str", ")", "\n", "}", "\n", "}", "\n\n", "return", "out", "\n", "}" ]
// keepUniqueStrings deduplicates strings in s. The output is sorted.
[ "keepUniqueStrings", "deduplicates", "strings", "in", "s", ".", "The", "output", "is", "sorted", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/fqdn/regexpmap/regexp_map.go#L246-L258
162,672
cilium/cilium
common/utils.go
FindEPConfigCHeader
func FindEPConfigCHeader(basePath string, epFiles []os.FileInfo) string { for _, epFile := range epFiles { if epFile.Name() == CHeaderFileName { return filepath.Join(basePath, epFile.Name()) } } return "" }
go
func FindEPConfigCHeader(basePath string, epFiles []os.FileInfo) string { for _, epFile := range epFiles { if epFile.Name() == CHeaderFileName { return filepath.Join(basePath, epFile.Name()) } } return "" }
[ "func", "FindEPConfigCHeader", "(", "basePath", "string", ",", "epFiles", "[", "]", "os", ".", "FileInfo", ")", "string", "{", "for", "_", ",", "epFile", ":=", "range", "epFiles", "{", "if", "epFile", ".", "Name", "(", ")", "==", "CHeaderFileName", "{", "return", "filepath", ".", "Join", "(", "basePath", ",", "epFile", ".", "Name", "(", ")", ")", "\n", "}", "\n", "}", "\n", "return", "\"", "\"", "\n", "}" ]
// FindEPConfigCHeader returns the full path of the file that is the CHeaderFileName from // the slice of files
[ "FindEPConfigCHeader", "returns", "the", "full", "path", "of", "the", "file", "that", "is", "the", "CHeaderFileName", "from", "the", "slice", "of", "files" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/common/utils.go#L53-L60
162,673
cilium/cilium
common/utils.go
GetCiliumVersionString
func GetCiliumVersionString(epCHeaderFilePath string) (string, error) { f, err := os.Open(epCHeaderFilePath) if err != nil { return "", err } br := bufio.NewReader(f) defer f.Close() for { s, err := br.ReadString('\n') if err == io.EOF { return "", nil } if err != nil { return "", err } if strings.Contains(s, CiliumCHeaderPrefix) { return s, nil } } }
go
func GetCiliumVersionString(epCHeaderFilePath string) (string, error) { f, err := os.Open(epCHeaderFilePath) if err != nil { return "", err } br := bufio.NewReader(f) defer f.Close() for { s, err := br.ReadString('\n') if err == io.EOF { return "", nil } if err != nil { return "", err } if strings.Contains(s, CiliumCHeaderPrefix) { return s, nil } } }
[ "func", "GetCiliumVersionString", "(", "epCHeaderFilePath", "string", ")", "(", "string", ",", "error", ")", "{", "f", ",", "err", ":=", "os", ".", "Open", "(", "epCHeaderFilePath", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "err", "\n", "}", "\n", "br", ":=", "bufio", ".", "NewReader", "(", "f", ")", "\n", "defer", "f", ".", "Close", "(", ")", "\n", "for", "{", "s", ",", "err", ":=", "br", ".", "ReadString", "(", "'\\n'", ")", "\n", "if", "err", "==", "io", ".", "EOF", "{", "return", "\"", "\"", ",", "nil", "\n", "}", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "err", "\n", "}", "\n", "if", "strings", ".", "Contains", "(", "s", ",", "CiliumCHeaderPrefix", ")", "{", "return", "s", ",", "nil", "\n", "}", "\n", "}", "\n", "}" ]
// GetCiliumVersionString returns the first line containing CiliumCHeaderPrefix.
[ "GetCiliumVersionString", "returns", "the", "first", "line", "containing", "CiliumCHeaderPrefix", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/common/utils.go#L63-L82
162,674
cilium/cilium
common/utils.go
RequireRootPrivilege
func RequireRootPrivilege(cmd string) { if os.Getuid() != 0 { fmt.Fprintf(os.Stderr, "Please run %q command(s) with root privileges.\n", cmd) os.Exit(1) } }
go
func RequireRootPrivilege(cmd string) { if os.Getuid() != 0 { fmt.Fprintf(os.Stderr, "Please run %q command(s) with root privileges.\n", cmd) os.Exit(1) } }
[ "func", "RequireRootPrivilege", "(", "cmd", "string", ")", "{", "if", "os", ".", "Getuid", "(", ")", "!=", "0", "{", "fmt", ".", "Fprintf", "(", "os", ".", "Stderr", ",", "\"", "\\n", "\"", ",", "cmd", ")", "\n", "os", ".", "Exit", "(", "1", ")", "\n", "}", "\n", "}" ]
// RequireRootPrivilege checks if the user running cmd is root. If not, it exits the program
[ "RequireRootPrivilege", "checks", "if", "the", "user", "running", "cmd", "is", "root", ".", "If", "not", "it", "exits", "the", "program" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/common/utils.go#L85-L90
162,675
cilium/cilium
common/utils.go
MoveNewFilesTo
func MoveNewFilesTo(oldDir, newDir string) error { oldFiles, err := ioutil.ReadDir(oldDir) if err != nil { return err } newFiles, err := ioutil.ReadDir(newDir) if err != nil { return err } for _, oldFile := range oldFiles { exists := false for _, newFile := range newFiles { if oldFile.Name() == newFile.Name() { exists = true break } } if !exists { os.Rename(filepath.Join(oldDir, oldFile.Name()), filepath.Join(newDir, oldFile.Name())) } } return nil }
go
func MoveNewFilesTo(oldDir, newDir string) error { oldFiles, err := ioutil.ReadDir(oldDir) if err != nil { return err } newFiles, err := ioutil.ReadDir(newDir) if err != nil { return err } for _, oldFile := range oldFiles { exists := false for _, newFile := range newFiles { if oldFile.Name() == newFile.Name() { exists = true break } } if !exists { os.Rename(filepath.Join(oldDir, oldFile.Name()), filepath.Join(newDir, oldFile.Name())) } } return nil }
[ "func", "MoveNewFilesTo", "(", "oldDir", ",", "newDir", "string", ")", "error", "{", "oldFiles", ",", "err", ":=", "ioutil", ".", "ReadDir", "(", "oldDir", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "newFiles", ",", "err", ":=", "ioutil", ".", "ReadDir", "(", "newDir", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "for", "_", ",", "oldFile", ":=", "range", "oldFiles", "{", "exists", ":=", "false", "\n", "for", "_", ",", "newFile", ":=", "range", "newFiles", "{", "if", "oldFile", ".", "Name", "(", ")", "==", "newFile", ".", "Name", "(", ")", "{", "exists", "=", "true", "\n", "break", "\n", "}", "\n", "}", "\n", "if", "!", "exists", "{", "os", ".", "Rename", "(", "filepath", ".", "Join", "(", "oldDir", ",", "oldFile", ".", "Name", "(", ")", ")", ",", "filepath", ".", "Join", "(", "newDir", ",", "oldFile", ".", "Name", "(", ")", ")", ")", "\n", "}", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// MoveNewFilesTo copies all files, that do not exist in newDir, from oldDir.
[ "MoveNewFilesTo", "copies", "all", "files", "that", "do", "not", "exist", "in", "newDir", "from", "oldDir", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/common/utils.go#L93-L116
162,676
cilium/cilium
api/v1/client/endpoint/put_endpoint_id_parameters.go
WithTimeout
func (o *PutEndpointIDParams) WithTimeout(timeout time.Duration) *PutEndpointIDParams { o.SetTimeout(timeout) return o }
go
func (o *PutEndpointIDParams) WithTimeout(timeout time.Duration) *PutEndpointIDParams { o.SetTimeout(timeout) return o }
[ "func", "(", "o", "*", "PutEndpointIDParams", ")", "WithTimeout", "(", "timeout", "time", ".", "Duration", ")", "*", "PutEndpointIDParams", "{", "o", ".", "SetTimeout", "(", "timeout", ")", "\n", "return", "o", "\n", "}" ]
// WithTimeout adds the timeout to the put endpoint ID params
[ "WithTimeout", "adds", "the", "timeout", "to", "the", "put", "endpoint", "ID", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/endpoint/put_endpoint_id_parameters.go#L92-L95
162,677
cilium/cilium
api/v1/client/endpoint/put_endpoint_id_parameters.go
WithContext
func (o *PutEndpointIDParams) WithContext(ctx context.Context) *PutEndpointIDParams { o.SetContext(ctx) return o }
go
func (o *PutEndpointIDParams) WithContext(ctx context.Context) *PutEndpointIDParams { o.SetContext(ctx) return o }
[ "func", "(", "o", "*", "PutEndpointIDParams", ")", "WithContext", "(", "ctx", "context", ".", "Context", ")", "*", "PutEndpointIDParams", "{", "o", ".", "SetContext", "(", "ctx", ")", "\n", "return", "o", "\n", "}" ]
// WithContext adds the context to the put endpoint ID params
[ "WithContext", "adds", "the", "context", "to", "the", "put", "endpoint", "ID", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/endpoint/put_endpoint_id_parameters.go#L103-L106
162,678
cilium/cilium
api/v1/client/endpoint/put_endpoint_id_parameters.go
WithHTTPClient
func (o *PutEndpointIDParams) WithHTTPClient(client *http.Client) *PutEndpointIDParams { o.SetHTTPClient(client) return o }
go
func (o *PutEndpointIDParams) WithHTTPClient(client *http.Client) *PutEndpointIDParams { o.SetHTTPClient(client) return o }
[ "func", "(", "o", "*", "PutEndpointIDParams", ")", "WithHTTPClient", "(", "client", "*", "http", ".", "Client", ")", "*", "PutEndpointIDParams", "{", "o", ".", "SetHTTPClient", "(", "client", ")", "\n", "return", "o", "\n", "}" ]
// WithHTTPClient adds the HTTPClient to the put endpoint ID params
[ "WithHTTPClient", "adds", "the", "HTTPClient", "to", "the", "put", "endpoint", "ID", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/endpoint/put_endpoint_id_parameters.go#L114-L117
162,679
cilium/cilium
api/v1/client/endpoint/put_endpoint_id_parameters.go
WithEndpoint
func (o *PutEndpointIDParams) WithEndpoint(endpoint *models.EndpointChangeRequest) *PutEndpointIDParams { o.SetEndpoint(endpoint) return o }
go
func (o *PutEndpointIDParams) WithEndpoint(endpoint *models.EndpointChangeRequest) *PutEndpointIDParams { o.SetEndpoint(endpoint) return o }
[ "func", "(", "o", "*", "PutEndpointIDParams", ")", "WithEndpoint", "(", "endpoint", "*", "models", ".", "EndpointChangeRequest", ")", "*", "PutEndpointIDParams", "{", "o", ".", "SetEndpoint", "(", "endpoint", ")", "\n", "return", "o", "\n", "}" ]
// WithEndpoint adds the endpoint to the put endpoint ID params
[ "WithEndpoint", "adds", "the", "endpoint", "to", "the", "put", "endpoint", "ID", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/endpoint/put_endpoint_id_parameters.go#L125-L128
162,680
cilium/cilium
api/v1/client/endpoint/put_endpoint_id_parameters.go
WithID
func (o *PutEndpointIDParams) WithID(id string) *PutEndpointIDParams { o.SetID(id) return o }
go
func (o *PutEndpointIDParams) WithID(id string) *PutEndpointIDParams { o.SetID(id) return o }
[ "func", "(", "o", "*", "PutEndpointIDParams", ")", "WithID", "(", "id", "string", ")", "*", "PutEndpointIDParams", "{", "o", ".", "SetID", "(", "id", ")", "\n", "return", "o", "\n", "}" ]
// WithID adds the id to the put endpoint ID params
[ "WithID", "adds", "the", "id", "to", "the", "put", "endpoint", "ID", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/endpoint/put_endpoint_id_parameters.go#L136-L139
162,681
cilium/cilium
api/v1/server/restapi/prefilter/get_prefilter.go
NewGetPrefilter
func NewGetPrefilter(ctx *middleware.Context, handler GetPrefilterHandler) *GetPrefilter { return &GetPrefilter{Context: ctx, Handler: handler} }
go
func NewGetPrefilter(ctx *middleware.Context, handler GetPrefilterHandler) *GetPrefilter { return &GetPrefilter{Context: ctx, Handler: handler} }
[ "func", "NewGetPrefilter", "(", "ctx", "*", "middleware", ".", "Context", ",", "handler", "GetPrefilterHandler", ")", "*", "GetPrefilter", "{", "return", "&", "GetPrefilter", "{", "Context", ":", "ctx", ",", "Handler", ":", "handler", "}", "\n", "}" ]
// NewGetPrefilter creates a new http.Handler for the get prefilter operation
[ "NewGetPrefilter", "creates", "a", "new", "http", ".", "Handler", "for", "the", "get", "prefilter", "operation" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/server/restapi/prefilter/get_prefilter.go#L28-L30
162,682
cilium/cilium
api/v1/server/restapi/policy/get_policy_resolve.go
NewGetPolicyResolve
func NewGetPolicyResolve(ctx *middleware.Context, handler GetPolicyResolveHandler) *GetPolicyResolve { return &GetPolicyResolve{Context: ctx, Handler: handler} }
go
func NewGetPolicyResolve(ctx *middleware.Context, handler GetPolicyResolveHandler) *GetPolicyResolve { return &GetPolicyResolve{Context: ctx, Handler: handler} }
[ "func", "NewGetPolicyResolve", "(", "ctx", "*", "middleware", ".", "Context", ",", "handler", "GetPolicyResolveHandler", ")", "*", "GetPolicyResolve", "{", "return", "&", "GetPolicyResolve", "{", "Context", ":", "ctx", ",", "Handler", ":", "handler", "}", "\n", "}" ]
// NewGetPolicyResolve creates a new http.Handler for the get policy resolve operation
[ "NewGetPolicyResolve", "creates", "a", "new", "http", ".", "Handler", "for", "the", "get", "policy", "resolve", "operation" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/server/restapi/policy/get_policy_resolve.go#L28-L30
162,683
cilium/cilium
pkg/monitor/api/drop.go
DropReason
func DropReason(reason uint8) string { if err, ok := errors[reason]; ok { return err } return fmt.Sprintf("%d", reason) }
go
func DropReason(reason uint8) string { if err, ok := errors[reason]; ok { return err } return fmt.Sprintf("%d", reason) }
[ "func", "DropReason", "(", "reason", "uint8", ")", "string", "{", "if", "err", ",", "ok", ":=", "errors", "[", "reason", "]", ";", "ok", "{", "return", "err", "\n", "}", "\n", "return", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "reason", ")", "\n", "}" ]
// DropReason prints the drop reason in a human readable string
[ "DropReason", "prints", "the", "drop", "reason", "in", "a", "human", "readable", "string" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/monitor/api/drop.go#L66-L71
162,684
cilium/cilium
api/v1/health/models/path_status.go
Validate
func (m *PathStatus) Validate(formats strfmt.Registry) error { var res []error if err := m.validateHTTP(formats); err != nil { res = append(res, err) } if err := m.validateIcmp(formats); err != nil { res = append(res, err) } if len(res) > 0 { return errors.CompositeValidationError(res...) } return nil }
go
func (m *PathStatus) Validate(formats strfmt.Registry) error { var res []error if err := m.validateHTTP(formats); err != nil { res = append(res, err) } if err := m.validateIcmp(formats); err != nil { res = append(res, err) } if len(res) > 0 { return errors.CompositeValidationError(res...) } return nil }
[ "func", "(", "m", "*", "PathStatus", ")", "Validate", "(", "formats", "strfmt", ".", "Registry", ")", "error", "{", "var", "res", "[", "]", "error", "\n\n", "if", "err", ":=", "m", ".", "validateHTTP", "(", "formats", ")", ";", "err", "!=", "nil", "{", "res", "=", "append", "(", "res", ",", "err", ")", "\n", "}", "\n\n", "if", "err", ":=", "m", ".", "validateIcmp", "(", "formats", ")", ";", "err", "!=", "nil", "{", "res", "=", "append", "(", "res", ",", "err", ")", "\n", "}", "\n\n", "if", "len", "(", "res", ")", ">", "0", "{", "return", "errors", ".", "CompositeValidationError", "(", "res", "...", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Validate validates this path status
[ "Validate", "validates", "this", "path", "status" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/health/models/path_status.go#L32-L47
162,685
cilium/cilium
pkg/envoy/resources.go
handleIPDelete
func (cache *NPHDSCache) handleIPDelete(npHost *envoyAPI.NetworkPolicyHosts, peerIdentity, peerIP string) { targetIndex := -1 scopedLog := log.WithFields(logrus.Fields{ logfields.IPAddr: peerIP, logfields.Identity: peerIdentity, logfields.Modification: ipcache.Delete, }) for i, endpointIP := range npHost.HostAddresses { if endpointIP == peerIP { targetIndex = i break } } if targetIndex < 0 { scopedLog.Warning("Can't find IP in NPHDS cache") return } // If removing this host would result in empty list, delete it. // Otherwise, update to a list that doesn't contain the target IP if len(npHost.HostAddresses) <= 1 { cache.Delete(NetworkPolicyHostsTypeURL, peerIdentity, false) } else { // If the resource is to be updated, create a copy of it before // removing the IP address from its HostAddresses list. hostAddresses := make([]string, 0, len(npHost.HostAddresses)-1) if len(npHost.HostAddresses) == targetIndex { hostAddresses = append(hostAddresses, npHost.HostAddresses[0:targetIndex]...) } else { hostAddresses = append(hostAddresses, npHost.HostAddresses[0:targetIndex]...) hostAddresses = append(hostAddresses, npHost.HostAddresses[targetIndex+1:]...) } newNpHost := envoyAPI.NetworkPolicyHosts{ Policy: uint64(npHost.Policy), HostAddresses: hostAddresses, } if err := newNpHost.Validate(); err != nil { scopedLog.WithError(err).Warning("Could not validate NPHDS resource update on delete") return } cache.Upsert(NetworkPolicyHostsTypeURL, peerIdentity, &newNpHost, false) } }
go
func (cache *NPHDSCache) handleIPDelete(npHost *envoyAPI.NetworkPolicyHosts, peerIdentity, peerIP string) { targetIndex := -1 scopedLog := log.WithFields(logrus.Fields{ logfields.IPAddr: peerIP, logfields.Identity: peerIdentity, logfields.Modification: ipcache.Delete, }) for i, endpointIP := range npHost.HostAddresses { if endpointIP == peerIP { targetIndex = i break } } if targetIndex < 0 { scopedLog.Warning("Can't find IP in NPHDS cache") return } // If removing this host would result in empty list, delete it. // Otherwise, update to a list that doesn't contain the target IP if len(npHost.HostAddresses) <= 1 { cache.Delete(NetworkPolicyHostsTypeURL, peerIdentity, false) } else { // If the resource is to be updated, create a copy of it before // removing the IP address from its HostAddresses list. hostAddresses := make([]string, 0, len(npHost.HostAddresses)-1) if len(npHost.HostAddresses) == targetIndex { hostAddresses = append(hostAddresses, npHost.HostAddresses[0:targetIndex]...) } else { hostAddresses = append(hostAddresses, npHost.HostAddresses[0:targetIndex]...) hostAddresses = append(hostAddresses, npHost.HostAddresses[targetIndex+1:]...) } newNpHost := envoyAPI.NetworkPolicyHosts{ Policy: uint64(npHost.Policy), HostAddresses: hostAddresses, } if err := newNpHost.Validate(); err != nil { scopedLog.WithError(err).Warning("Could not validate NPHDS resource update on delete") return } cache.Upsert(NetworkPolicyHostsTypeURL, peerIdentity, &newNpHost, false) } }
[ "func", "(", "cache", "*", "NPHDSCache", ")", "handleIPDelete", "(", "npHost", "*", "envoyAPI", ".", "NetworkPolicyHosts", ",", "peerIdentity", ",", "peerIP", "string", ")", "{", "targetIndex", ":=", "-", "1", "\n\n", "scopedLog", ":=", "log", ".", "WithFields", "(", "logrus", ".", "Fields", "{", "logfields", ".", "IPAddr", ":", "peerIP", ",", "logfields", ".", "Identity", ":", "peerIdentity", ",", "logfields", ".", "Modification", ":", "ipcache", ".", "Delete", ",", "}", ")", "\n", "for", "i", ",", "endpointIP", ":=", "range", "npHost", ".", "HostAddresses", "{", "if", "endpointIP", "==", "peerIP", "{", "targetIndex", "=", "i", "\n", "break", "\n", "}", "\n", "}", "\n", "if", "targetIndex", "<", "0", "{", "scopedLog", ".", "Warning", "(", "\"", "\"", ")", "\n", "return", "\n", "}", "\n\n", "// If removing this host would result in empty list, delete it.", "// Otherwise, update to a list that doesn't contain the target IP", "if", "len", "(", "npHost", ".", "HostAddresses", ")", "<=", "1", "{", "cache", ".", "Delete", "(", "NetworkPolicyHostsTypeURL", ",", "peerIdentity", ",", "false", ")", "\n", "}", "else", "{", "// If the resource is to be updated, create a copy of it before", "// removing the IP address from its HostAddresses list.", "hostAddresses", ":=", "make", "(", "[", "]", "string", ",", "0", ",", "len", "(", "npHost", ".", "HostAddresses", ")", "-", "1", ")", "\n", "if", "len", "(", "npHost", ".", "HostAddresses", ")", "==", "targetIndex", "{", "hostAddresses", "=", "append", "(", "hostAddresses", ",", "npHost", ".", "HostAddresses", "[", "0", ":", "targetIndex", "]", "...", ")", "\n", "}", "else", "{", "hostAddresses", "=", "append", "(", "hostAddresses", ",", "npHost", ".", "HostAddresses", "[", "0", ":", "targetIndex", "]", "...", ")", "\n", "hostAddresses", "=", "append", "(", "hostAddresses", ",", "npHost", ".", "HostAddresses", "[", "targetIndex", "+", "1", ":", "]", "...", ")", "\n", "}", "\n\n", "newNpHost", ":=", "envoyAPI", ".", "NetworkPolicyHosts", "{", "Policy", ":", "uint64", "(", "npHost", ".", "Policy", ")", ",", "HostAddresses", ":", "hostAddresses", ",", "}", "\n", "if", "err", ":=", "newNpHost", ".", "Validate", "(", ")", ";", "err", "!=", "nil", "{", "scopedLog", ".", "WithError", "(", "err", ")", ".", "Warning", "(", "\"", "\"", ")", "\n", "return", "\n", "}", "\n", "cache", ".", "Upsert", "(", "NetworkPolicyHostsTypeURL", ",", "peerIdentity", ",", "&", "newNpHost", ",", "false", ")", "\n", "}", "\n", "}" ]
// handleIPUpsert deletes elements from the NPHDS cache with the specified peer IP->ID mapping.
[ "handleIPUpsert", "deletes", "elements", "from", "the", "NPHDS", "cache", "with", "the", "specified", "peer", "IP", "-", ">", "ID", "mapping", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/envoy/resources.go#L130-L174
162,686
cilium/cilium
pkg/metrics/middleware.go
ServeHTTP
func (m *APIEventTSHelper) ServeHTTP(r http.ResponseWriter, req *http.Request) { m.TSGauge.SetToCurrentTime() duration := spanstat.Start() rw := &responderWrapper{ResponseWriter: r} m.Next.ServeHTTP(rw, req) if req != nil && req.URL != nil && req.URL.Path != "" { path := getShortPath(req.URL.Path) took := float64(duration.End(true).Total().Seconds()) m.Histogram.WithLabelValues(path, req.Method, strconv.Itoa(rw.code)).Observe(took) } }
go
func (m *APIEventTSHelper) ServeHTTP(r http.ResponseWriter, req *http.Request) { m.TSGauge.SetToCurrentTime() duration := spanstat.Start() rw := &responderWrapper{ResponseWriter: r} m.Next.ServeHTTP(rw, req) if req != nil && req.URL != nil && req.URL.Path != "" { path := getShortPath(req.URL.Path) took := float64(duration.End(true).Total().Seconds()) m.Histogram.WithLabelValues(path, req.Method, strconv.Itoa(rw.code)).Observe(took) } }
[ "func", "(", "m", "*", "APIEventTSHelper", ")", "ServeHTTP", "(", "r", "http", ".", "ResponseWriter", ",", "req", "*", "http", ".", "Request", ")", "{", "m", ".", "TSGauge", ".", "SetToCurrentTime", "(", ")", "\n", "duration", ":=", "spanstat", ".", "Start", "(", ")", "\n", "rw", ":=", "&", "responderWrapper", "{", "ResponseWriter", ":", "r", "}", "\n", "m", ".", "Next", ".", "ServeHTTP", "(", "rw", ",", "req", ")", "\n", "if", "req", "!=", "nil", "&&", "req", ".", "URL", "!=", "nil", "&&", "req", ".", "URL", ".", "Path", "!=", "\"", "\"", "{", "path", ":=", "getShortPath", "(", "req", ".", "URL", ".", "Path", ")", "\n", "took", ":=", "float64", "(", "duration", ".", "End", "(", "true", ")", ".", "Total", "(", ")", ".", "Seconds", "(", ")", ")", "\n", "m", ".", "Histogram", ".", "WithLabelValues", "(", "path", ",", "req", ".", "Method", ",", "strconv", ".", "Itoa", "(", "rw", ".", "code", ")", ")", ".", "Observe", "(", "took", ")", "\n", "}", "\n", "}" ]
// ServeHTTP implements the http.Handler interface. It records the timestamp // this API call began at, then chains to the next handler.
[ "ServeHTTP", "implements", "the", "http", ".", "Handler", "interface", ".", "It", "records", "the", "timestamp", "this", "API", "call", "began", "at", "then", "chains", "to", "the", "next", "handler", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/metrics/middleware.go#L65-L75
162,687
cilium/cilium
pkg/sockops/sockops.go
bpftoolMapAttach
func bpftoolMapAttach(progID string, mapID string) error { prog := "bpftool" args := []string{"prog", "attach", "id", progID, "msg_verdict", "id", mapID} log.WithFields(logrus.Fields{ "bpftool": prog, "args": args, }).Debug("Map Attach BPF Object:") out, err := exec.Command(prog, args...).CombinedOutput() if err != nil { return fmt.Errorf("Failed to attach prog(%s) to map(%s): %s: %s", progID, mapID, err, out) } return nil }
go
func bpftoolMapAttach(progID string, mapID string) error { prog := "bpftool" args := []string{"prog", "attach", "id", progID, "msg_verdict", "id", mapID} log.WithFields(logrus.Fields{ "bpftool": prog, "args": args, }).Debug("Map Attach BPF Object:") out, err := exec.Command(prog, args...).CombinedOutput() if err != nil { return fmt.Errorf("Failed to attach prog(%s) to map(%s): %s: %s", progID, mapID, err, out) } return nil }
[ "func", "bpftoolMapAttach", "(", "progID", "string", ",", "mapID", "string", ")", "error", "{", "prog", ":=", "\"", "\"", "\n\n", "args", ":=", "[", "]", "string", "{", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ",", "progID", ",", "\"", "\"", ",", "\"", "\"", ",", "mapID", "}", "\n", "log", ".", "WithFields", "(", "logrus", ".", "Fields", "{", "\"", "\"", ":", "prog", ",", "\"", "\"", ":", "args", ",", "}", ")", ".", "Debug", "(", "\"", "\"", ")", "\n", "out", ",", "err", ":=", "exec", ".", "Command", "(", "prog", ",", "args", "...", ")", ".", "CombinedOutput", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "progID", ",", "mapID", ",", "err", ",", "out", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// BPF programs and sockmaps working on cgroups
[ "BPF", "programs", "and", "sockmaps", "working", "on", "cgroups" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/sockops/sockops.go#L61-L74
162,688
cilium/cilium
pkg/sockops/sockops.go
bpfLoadAttachProg
func bpfLoadAttachProg(object string, load string, mapName string) (int, int, error) { sockopsObj := filepath.Join(option.Config.StateDir, object) mapID := 0 err := bpftoolLoad(sockopsObj, load) if err != nil { return 0, 0, err } err = bpftoolAttach(load) if err != nil { return 0, 0, err } if mapName != "" { mapID, err = bpftoolGetMapID(load, mapName) if err != nil { return 0, mapID, err } err = bpftoolPinMapID(mapName, mapID) if err != nil { return 0, mapID, err } } return 0, mapID, nil }
go
func bpfLoadAttachProg(object string, load string, mapName string) (int, int, error) { sockopsObj := filepath.Join(option.Config.StateDir, object) mapID := 0 err := bpftoolLoad(sockopsObj, load) if err != nil { return 0, 0, err } err = bpftoolAttach(load) if err != nil { return 0, 0, err } if mapName != "" { mapID, err = bpftoolGetMapID(load, mapName) if err != nil { return 0, mapID, err } err = bpftoolPinMapID(mapName, mapID) if err != nil { return 0, mapID, err } } return 0, mapID, nil }
[ "func", "bpfLoadAttachProg", "(", "object", "string", ",", "load", "string", ",", "mapName", "string", ")", "(", "int", ",", "int", ",", "error", ")", "{", "sockopsObj", ":=", "filepath", ".", "Join", "(", "option", ".", "Config", ".", "StateDir", ",", "object", ")", "\n", "mapID", ":=", "0", "\n\n", "err", ":=", "bpftoolLoad", "(", "sockopsObj", ",", "load", ")", "\n", "if", "err", "!=", "nil", "{", "return", "0", ",", "0", ",", "err", "\n", "}", "\n", "err", "=", "bpftoolAttach", "(", "load", ")", "\n", "if", "err", "!=", "nil", "{", "return", "0", ",", "0", ",", "err", "\n", "}", "\n\n", "if", "mapName", "!=", "\"", "\"", "{", "mapID", ",", "err", "=", "bpftoolGetMapID", "(", "load", ",", "mapName", ")", "\n", "if", "err", "!=", "nil", "{", "return", "0", ",", "mapID", ",", "err", "\n", "}", "\n\n", "err", "=", "bpftoolPinMapID", "(", "mapName", ",", "mapID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "0", ",", "mapID", ",", "err", "\n", "}", "\n", "}", "\n", "return", "0", ",", "mapID", ",", "nil", "\n", "}" ]
// First user of sockops root is sockops load programs so we ensure the sockops // root path no longer changes.
[ "First", "user", "of", "sockops", "root", "is", "sockops", "load", "programs", "so", "we", "ensure", "the", "sockops", "root", "path", "no", "longer", "changes", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/sockops/sockops.go#L333-L358
162,689
cilium/cilium
pkg/sockops/sockops.go
SockmapEnable
func SockmapEnable() error { err := bpfCompileProg(cSockops, oSockops) if err != nil { log.Error(err) return err } progID, mapID, err := bpfLoadAttachProg(oSockops, eSockops, sockMap) if err != nil { log.Error(err) return err } log.Infof("Sockmap Enabled: bpf_sockops prog_id %d and map_id %d loaded", progID, mapID) return nil }
go
func SockmapEnable() error { err := bpfCompileProg(cSockops, oSockops) if err != nil { log.Error(err) return err } progID, mapID, err := bpfLoadAttachProg(oSockops, eSockops, sockMap) if err != nil { log.Error(err) return err } log.Infof("Sockmap Enabled: bpf_sockops prog_id %d and map_id %d loaded", progID, mapID) return nil }
[ "func", "SockmapEnable", "(", ")", "error", "{", "err", ":=", "bpfCompileProg", "(", "cSockops", ",", "oSockops", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Error", "(", "err", ")", "\n", "return", "err", "\n", "}", "\n", "progID", ",", "mapID", ",", "err", ":=", "bpfLoadAttachProg", "(", "oSockops", ",", "eSockops", ",", "sockMap", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Error", "(", "err", ")", "\n", "return", "err", "\n", "}", "\n", "log", ".", "Infof", "(", "\"", "\"", ",", "progID", ",", "mapID", ")", "\n", "return", "nil", "\n", "}" ]
// SockmapEnable will compile sockops programs and attach the sockops programs // to the cgroup. After this all TCP connect events will be filtered by a BPF // sockops program.
[ "SockmapEnable", "will", "compile", "sockops", "programs", "and", "attach", "the", "sockops", "programs", "to", "the", "cgroup", ".", "After", "this", "all", "TCP", "connect", "events", "will", "be", "filtered", "by", "a", "BPF", "sockops", "program", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/sockops/sockops.go#L363-L376
162,690
cilium/cilium
pkg/sockops/sockops.go
SockmapDisable
func SockmapDisable() { mapName := filepath.Join(mapPrefix, sockMap) bpftoolDetach(eSockops) bpftoolUnload(eSockops) bpftoolUnload(mapName) }
go
func SockmapDisable() { mapName := filepath.Join(mapPrefix, sockMap) bpftoolDetach(eSockops) bpftoolUnload(eSockops) bpftoolUnload(mapName) }
[ "func", "SockmapDisable", "(", ")", "{", "mapName", ":=", "filepath", ".", "Join", "(", "mapPrefix", ",", "sockMap", ")", "\n", "bpftoolDetach", "(", "eSockops", ")", "\n", "bpftoolUnload", "(", "eSockops", ")", "\n", "bpftoolUnload", "(", "mapName", ")", "\n", "}" ]
// SockmapDisable will detach any sockmap programs from cgroups then "unload" // all the programs and maps associated with it. Here "unload" just means // deleting the file associated with the map.
[ "SockmapDisable", "will", "detach", "any", "sockmap", "programs", "from", "cgroups", "then", "unload", "all", "the", "programs", "and", "maps", "associated", "with", "it", ".", "Here", "unload", "just", "means", "deleting", "the", "file", "associated", "with", "the", "map", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/sockops/sockops.go#L381-L386
162,691
cilium/cilium
api/v1/client/endpoint/get_endpoint_id_healthz_parameters.go
WithTimeout
func (o *GetEndpointIDHealthzParams) WithTimeout(timeout time.Duration) *GetEndpointIDHealthzParams { o.SetTimeout(timeout) return o }
go
func (o *GetEndpointIDHealthzParams) WithTimeout(timeout time.Duration) *GetEndpointIDHealthzParams { o.SetTimeout(timeout) return o }
[ "func", "(", "o", "*", "GetEndpointIDHealthzParams", ")", "WithTimeout", "(", "timeout", "time", ".", "Duration", ")", "*", "GetEndpointIDHealthzParams", "{", "o", ".", "SetTimeout", "(", "timeout", ")", "\n", "return", "o", "\n", "}" ]
// WithTimeout adds the timeout to the get endpoint ID healthz params
[ "WithTimeout", "adds", "the", "timeout", "to", "the", "get", "endpoint", "ID", "healthz", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/endpoint/get_endpoint_id_healthz_parameters.go#L88-L91
162,692
cilium/cilium
api/v1/client/endpoint/get_endpoint_id_healthz_parameters.go
WithContext
func (o *GetEndpointIDHealthzParams) WithContext(ctx context.Context) *GetEndpointIDHealthzParams { o.SetContext(ctx) return o }
go
func (o *GetEndpointIDHealthzParams) WithContext(ctx context.Context) *GetEndpointIDHealthzParams { o.SetContext(ctx) return o }
[ "func", "(", "o", "*", "GetEndpointIDHealthzParams", ")", "WithContext", "(", "ctx", "context", ".", "Context", ")", "*", "GetEndpointIDHealthzParams", "{", "o", ".", "SetContext", "(", "ctx", ")", "\n", "return", "o", "\n", "}" ]
// WithContext adds the context to the get endpoint ID healthz params
[ "WithContext", "adds", "the", "context", "to", "the", "get", "endpoint", "ID", "healthz", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/endpoint/get_endpoint_id_healthz_parameters.go#L99-L102
162,693
cilium/cilium
api/v1/client/endpoint/get_endpoint_id_healthz_parameters.go
WithHTTPClient
func (o *GetEndpointIDHealthzParams) WithHTTPClient(client *http.Client) *GetEndpointIDHealthzParams { o.SetHTTPClient(client) return o }
go
func (o *GetEndpointIDHealthzParams) WithHTTPClient(client *http.Client) *GetEndpointIDHealthzParams { o.SetHTTPClient(client) return o }
[ "func", "(", "o", "*", "GetEndpointIDHealthzParams", ")", "WithHTTPClient", "(", "client", "*", "http", ".", "Client", ")", "*", "GetEndpointIDHealthzParams", "{", "o", ".", "SetHTTPClient", "(", "client", ")", "\n", "return", "o", "\n", "}" ]
// WithHTTPClient adds the HTTPClient to the get endpoint ID healthz params
[ "WithHTTPClient", "adds", "the", "HTTPClient", "to", "the", "get", "endpoint", "ID", "healthz", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/endpoint/get_endpoint_id_healthz_parameters.go#L110-L113
162,694
cilium/cilium
api/v1/client/endpoint/get_endpoint_id_healthz_parameters.go
WithID
func (o *GetEndpointIDHealthzParams) WithID(id string) *GetEndpointIDHealthzParams { o.SetID(id) return o }
go
func (o *GetEndpointIDHealthzParams) WithID(id string) *GetEndpointIDHealthzParams { o.SetID(id) return o }
[ "func", "(", "o", "*", "GetEndpointIDHealthzParams", ")", "WithID", "(", "id", "string", ")", "*", "GetEndpointIDHealthzParams", "{", "o", ".", "SetID", "(", "id", ")", "\n", "return", "o", "\n", "}" ]
// WithID adds the id to the get endpoint ID healthz params
[ "WithID", "adds", "the", "id", "to", "the", "get", "endpoint", "ID", "healthz", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/endpoint/get_endpoint_id_healthz_parameters.go#L121-L124
162,695
cilium/cilium
daemon/daemon.go
UpdateProxyRedirect
func (d *Daemon) UpdateProxyRedirect(e *endpoint.Endpoint, l4 *policy.L4Filter, proxyWaitGroup *completion.WaitGroup) (uint16, error, revert.FinalizeFunc, revert.RevertFunc) { if d.l7Proxy == nil { return 0, fmt.Errorf("can't redirect, proxy disabled"), nil, nil } port, err, finalizeFunc, revertFunc := d.l7Proxy.CreateOrUpdateRedirect(l4, e.ProxyID(l4), e, proxyWaitGroup) if err != nil { return 0, err, nil, nil } return port, nil, finalizeFunc, revertFunc }
go
func (d *Daemon) UpdateProxyRedirect(e *endpoint.Endpoint, l4 *policy.L4Filter, proxyWaitGroup *completion.WaitGroup) (uint16, error, revert.FinalizeFunc, revert.RevertFunc) { if d.l7Proxy == nil { return 0, fmt.Errorf("can't redirect, proxy disabled"), nil, nil } port, err, finalizeFunc, revertFunc := d.l7Proxy.CreateOrUpdateRedirect(l4, e.ProxyID(l4), e, proxyWaitGroup) if err != nil { return 0, err, nil, nil } return port, nil, finalizeFunc, revertFunc }
[ "func", "(", "d", "*", "Daemon", ")", "UpdateProxyRedirect", "(", "e", "*", "endpoint", ".", "Endpoint", ",", "l4", "*", "policy", ".", "L4Filter", ",", "proxyWaitGroup", "*", "completion", ".", "WaitGroup", ")", "(", "uint16", ",", "error", ",", "revert", ".", "FinalizeFunc", ",", "revert", ".", "RevertFunc", ")", "{", "if", "d", ".", "l7Proxy", "==", "nil", "{", "return", "0", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", ",", "nil", ",", "nil", "\n", "}", "\n\n", "port", ",", "err", ",", "finalizeFunc", ",", "revertFunc", ":=", "d", ".", "l7Proxy", ".", "CreateOrUpdateRedirect", "(", "l4", ",", "e", ".", "ProxyID", "(", "l4", ")", ",", "e", ",", "proxyWaitGroup", ")", "\n", "if", "err", "!=", "nil", "{", "return", "0", ",", "err", ",", "nil", ",", "nil", "\n", "}", "\n\n", "return", "port", ",", "nil", ",", "finalizeFunc", ",", "revertFunc", "\n", "}" ]
// UpdateProxyRedirect updates the redirect rules in the proxy for a particular // endpoint using the provided L4 filter. Returns the allocated proxy port
[ "UpdateProxyRedirect", "updates", "the", "redirect", "rules", "in", "the", "proxy", "for", "a", "particular", "endpoint", "using", "the", "provided", "L4", "filter", ".", "Returns", "the", "allocated", "proxy", "port" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/daemon/daemon.go#L198-L209
162,696
cilium/cilium
daemon/daemon.go
RemoveProxyRedirect
func (d *Daemon) RemoveProxyRedirect(e *endpoint.Endpoint, id string, proxyWaitGroup *completion.WaitGroup) (error, revert.FinalizeFunc, revert.RevertFunc) { if d.l7Proxy == nil { return nil, nil, nil } log.WithFields(logrus.Fields{ logfields.EndpointID: e.ID, logfields.L4PolicyID: id, }).Debug("Removing redirect to endpoint") return d.l7Proxy.RemoveRedirect(id, proxyWaitGroup) }
go
func (d *Daemon) RemoveProxyRedirect(e *endpoint.Endpoint, id string, proxyWaitGroup *completion.WaitGroup) (error, revert.FinalizeFunc, revert.RevertFunc) { if d.l7Proxy == nil { return nil, nil, nil } log.WithFields(logrus.Fields{ logfields.EndpointID: e.ID, logfields.L4PolicyID: id, }).Debug("Removing redirect to endpoint") return d.l7Proxy.RemoveRedirect(id, proxyWaitGroup) }
[ "func", "(", "d", "*", "Daemon", ")", "RemoveProxyRedirect", "(", "e", "*", "endpoint", ".", "Endpoint", ",", "id", "string", ",", "proxyWaitGroup", "*", "completion", ".", "WaitGroup", ")", "(", "error", ",", "revert", ".", "FinalizeFunc", ",", "revert", ".", "RevertFunc", ")", "{", "if", "d", ".", "l7Proxy", "==", "nil", "{", "return", "nil", ",", "nil", ",", "nil", "\n", "}", "\n\n", "log", ".", "WithFields", "(", "logrus", ".", "Fields", "{", "logfields", ".", "EndpointID", ":", "e", ".", "ID", ",", "logfields", ".", "L4PolicyID", ":", "id", ",", "}", ")", ".", "Debug", "(", "\"", "\"", ")", "\n", "return", "d", ".", "l7Proxy", ".", "RemoveRedirect", "(", "id", ",", "proxyWaitGroup", ")", "\n", "}" ]
// RemoveProxyRedirect removes a previously installed proxy redirect for an // endpoint
[ "RemoveProxyRedirect", "removes", "a", "previously", "installed", "proxy", "redirect", "for", "an", "endpoint" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/daemon/daemon.go#L213-L223
162,697
cilium/cilium
daemon/daemon.go
UpdateNetworkPolicy
func (d *Daemon) UpdateNetworkPolicy(e *endpoint.Endpoint, policy *policy.L4Policy, labelsMap, deniedIngressIdentities, deniedEgressIdentities cache.IdentityCache, proxyWaitGroup *completion.WaitGroup) (error, revert.RevertFunc) { if d.l7Proxy == nil { return fmt.Errorf("can't update network policy, proxy disabled"), nil } err, revertFunc := d.l7Proxy.UpdateNetworkPolicy(e, policy, e.GetIngressPolicyEnabledLocked(), e.GetEgressPolicyEnabledLocked(), labelsMap, deniedIngressIdentities, deniedEgressIdentities, proxyWaitGroup) return err, revert.RevertFunc(revertFunc) }
go
func (d *Daemon) UpdateNetworkPolicy(e *endpoint.Endpoint, policy *policy.L4Policy, labelsMap, deniedIngressIdentities, deniedEgressIdentities cache.IdentityCache, proxyWaitGroup *completion.WaitGroup) (error, revert.RevertFunc) { if d.l7Proxy == nil { return fmt.Errorf("can't update network policy, proxy disabled"), nil } err, revertFunc := d.l7Proxy.UpdateNetworkPolicy(e, policy, e.GetIngressPolicyEnabledLocked(), e.GetEgressPolicyEnabledLocked(), labelsMap, deniedIngressIdentities, deniedEgressIdentities, proxyWaitGroup) return err, revert.RevertFunc(revertFunc) }
[ "func", "(", "d", "*", "Daemon", ")", "UpdateNetworkPolicy", "(", "e", "*", "endpoint", ".", "Endpoint", ",", "policy", "*", "policy", ".", "L4Policy", ",", "labelsMap", ",", "deniedIngressIdentities", ",", "deniedEgressIdentities", "cache", ".", "IdentityCache", ",", "proxyWaitGroup", "*", "completion", ".", "WaitGroup", ")", "(", "error", ",", "revert", ".", "RevertFunc", ")", "{", "if", "d", ".", "l7Proxy", "==", "nil", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ")", ",", "nil", "\n", "}", "\n", "err", ",", "revertFunc", ":=", "d", ".", "l7Proxy", ".", "UpdateNetworkPolicy", "(", "e", ",", "policy", ",", "e", ".", "GetIngressPolicyEnabledLocked", "(", ")", ",", "e", ".", "GetEgressPolicyEnabledLocked", "(", ")", ",", "labelsMap", ",", "deniedIngressIdentities", ",", "deniedEgressIdentities", ",", "proxyWaitGroup", ")", "\n", "return", "err", ",", "revert", ".", "RevertFunc", "(", "revertFunc", ")", "\n", "}" ]
// UpdateNetworkPolicy adds or updates a network policy in the set // published to L7 proxies.
[ "UpdateNetworkPolicy", "adds", "or", "updates", "a", "network", "policy", "in", "the", "set", "published", "to", "L7", "proxies", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/daemon/daemon.go#L227-L235
162,698
cilium/cilium
daemon/daemon.go
RemoveNetworkPolicy
func (d *Daemon) RemoveNetworkPolicy(e *endpoint.Endpoint) { if d.l7Proxy == nil { return } d.l7Proxy.RemoveNetworkPolicy(e) }
go
func (d *Daemon) RemoveNetworkPolicy(e *endpoint.Endpoint) { if d.l7Proxy == nil { return } d.l7Proxy.RemoveNetworkPolicy(e) }
[ "func", "(", "d", "*", "Daemon", ")", "RemoveNetworkPolicy", "(", "e", "*", "endpoint", ".", "Endpoint", ")", "{", "if", "d", ".", "l7Proxy", "==", "nil", "{", "return", "\n", "}", "\n", "d", ".", "l7Proxy", ".", "RemoveNetworkPolicy", "(", "e", ")", "\n", "}" ]
// RemoveNetworkPolicy removes a network policy from the set published to // L7 proxies.
[ "RemoveNetworkPolicy", "removes", "a", "network", "policy", "from", "the", "set", "published", "to", "L7", "proxies", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/daemon/daemon.go#L239-L244
162,699
cilium/cilium
daemon/daemon.go
QueueEndpointBuild
func (d *Daemon) QueueEndpointBuild(ctx context.Context, epID uint64) (func(), error) { d.uniqueIDMU.Lock() // Skip new build requests if the endpoint is already in the queue // waiting. In this case the queued build will pick up any changes // made so far, so there is no need to queue another build now. if _, queued := d.uniqueID[epID]; queued { d.uniqueIDMU.Unlock() return nil, nil } // Store a cancel function to the 'uniqueID' map so that we can // cancel the wait when the endpoint is being deleted. uniqueIDCtx, cancel := context.WithCancel(ctx) d.uniqueID[epID] = cancel d.uniqueIDMU.Unlock() // Acquire build permit. This may block. err := d.buildEndpointSem.Acquire(uniqueIDCtx, 1) // Not queueing any more, so remove the cancel func from 'uniqueID' map. // The caller may still cancel the build by calling the cancel func after we // return it. After this point another build may be queued for this // endpoint. d.uniqueIDMU.Lock() delete(d.uniqueID, epID) d.uniqueIDMU.Unlock() if err != nil { return nil, err // Acquire failed } // Acquire succeeded, but the context was canceled after? if uniqueIDCtx.Err() != nil { d.buildEndpointSem.Release(1) return nil, uniqueIDCtx.Err() } // At this point the build permit has been acquired. It must // be released by the caller by calling the returned function // when the heavy lifting of the build is done. // Using sync.Once to make the returned function idempotent. var once sync.Once doneFunc := func() { once.Do(func() { d.buildEndpointSem.Release(1) }) } return doneFunc, nil }
go
func (d *Daemon) QueueEndpointBuild(ctx context.Context, epID uint64) (func(), error) { d.uniqueIDMU.Lock() // Skip new build requests if the endpoint is already in the queue // waiting. In this case the queued build will pick up any changes // made so far, so there is no need to queue another build now. if _, queued := d.uniqueID[epID]; queued { d.uniqueIDMU.Unlock() return nil, nil } // Store a cancel function to the 'uniqueID' map so that we can // cancel the wait when the endpoint is being deleted. uniqueIDCtx, cancel := context.WithCancel(ctx) d.uniqueID[epID] = cancel d.uniqueIDMU.Unlock() // Acquire build permit. This may block. err := d.buildEndpointSem.Acquire(uniqueIDCtx, 1) // Not queueing any more, so remove the cancel func from 'uniqueID' map. // The caller may still cancel the build by calling the cancel func after we // return it. After this point another build may be queued for this // endpoint. d.uniqueIDMU.Lock() delete(d.uniqueID, epID) d.uniqueIDMU.Unlock() if err != nil { return nil, err // Acquire failed } // Acquire succeeded, but the context was canceled after? if uniqueIDCtx.Err() != nil { d.buildEndpointSem.Release(1) return nil, uniqueIDCtx.Err() } // At this point the build permit has been acquired. It must // be released by the caller by calling the returned function // when the heavy lifting of the build is done. // Using sync.Once to make the returned function idempotent. var once sync.Once doneFunc := func() { once.Do(func() { d.buildEndpointSem.Release(1) }) } return doneFunc, nil }
[ "func", "(", "d", "*", "Daemon", ")", "QueueEndpointBuild", "(", "ctx", "context", ".", "Context", ",", "epID", "uint64", ")", "(", "func", "(", ")", ",", "error", ")", "{", "d", ".", "uniqueIDMU", ".", "Lock", "(", ")", "\n", "// Skip new build requests if the endpoint is already in the queue", "// waiting. In this case the queued build will pick up any changes", "// made so far, so there is no need to queue another build now.", "if", "_", ",", "queued", ":=", "d", ".", "uniqueID", "[", "epID", "]", ";", "queued", "{", "d", ".", "uniqueIDMU", ".", "Unlock", "(", ")", "\n", "return", "nil", ",", "nil", "\n", "}", "\n", "// Store a cancel function to the 'uniqueID' map so that we can", "// cancel the wait when the endpoint is being deleted.", "uniqueIDCtx", ",", "cancel", ":=", "context", ".", "WithCancel", "(", "ctx", ")", "\n", "d", ".", "uniqueID", "[", "epID", "]", "=", "cancel", "\n", "d", ".", "uniqueIDMU", ".", "Unlock", "(", ")", "\n\n", "// Acquire build permit. This may block.", "err", ":=", "d", ".", "buildEndpointSem", ".", "Acquire", "(", "uniqueIDCtx", ",", "1", ")", "\n\n", "// Not queueing any more, so remove the cancel func from 'uniqueID' map.", "// The caller may still cancel the build by calling the cancel func after we", "// return it. After this point another build may be queued for this", "// endpoint.", "d", ".", "uniqueIDMU", ".", "Lock", "(", ")", "\n", "delete", "(", "d", ".", "uniqueID", ",", "epID", ")", "\n", "d", ".", "uniqueIDMU", ".", "Unlock", "(", ")", "\n\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "// Acquire failed", "\n", "}", "\n\n", "// Acquire succeeded, but the context was canceled after?", "if", "uniqueIDCtx", ".", "Err", "(", ")", "!=", "nil", "{", "d", ".", "buildEndpointSem", ".", "Release", "(", "1", ")", "\n", "return", "nil", ",", "uniqueIDCtx", ".", "Err", "(", ")", "\n", "}", "\n\n", "// At this point the build permit has been acquired. It must", "// be released by the caller by calling the returned function", "// when the heavy lifting of the build is done.", "// Using sync.Once to make the returned function idempotent.", "var", "once", "sync", ".", "Once", "\n", "doneFunc", ":=", "func", "(", ")", "{", "once", ".", "Do", "(", "func", "(", ")", "{", "d", ".", "buildEndpointSem", ".", "Release", "(", "1", ")", "\n", "}", ")", "\n", "}", "\n", "return", "doneFunc", ",", "nil", "\n", "}" ]
// QueueEndpointBuild waits for a "build permit" for the endpoint // identified by 'epID'. This function blocks until the endpoint can // start building. The returned function must then be called to // release the "build permit" when the most resource intensive parts // of the build are done. The returned function is idempotent, so it // may be called more than once. Returns a nil function if the caller should NOT // start building the endpoint. This may happen due to a build being // queued for the endpoint already, or due to the wait for the build // permit being canceled. The latter case happens when the endpoint is // being deleted. Returns an error if the build permit could not be acquired.
[ "QueueEndpointBuild", "waits", "for", "a", "build", "permit", "for", "the", "endpoint", "identified", "by", "epID", ".", "This", "function", "blocks", "until", "the", "endpoint", "can", "start", "building", ".", "The", "returned", "function", "must", "then", "be", "called", "to", "release", "the", "build", "permit", "when", "the", "most", "resource", "intensive", "parts", "of", "the", "build", "are", "done", ".", "The", "returned", "function", "is", "idempotent", "so", "it", "may", "be", "called", "more", "than", "once", ".", "Returns", "a", "nil", "function", "if", "the", "caller", "should", "NOT", "start", "building", "the", "endpoint", ".", "This", "may", "happen", "due", "to", "a", "build", "being", "queued", "for", "the", "endpoint", "already", "or", "due", "to", "the", "wait", "for", "the", "build", "permit", "being", "canceled", ".", "The", "latter", "case", "happens", "when", "the", "endpoint", "is", "being", "deleted", ".", "Returns", "an", "error", "if", "the", "build", "permit", "could", "not", "be", "acquired", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/daemon/daemon.go#L256-L303