id
int32 0
167k
| repo
stringlengths 5
54
| path
stringlengths 4
155
| func_name
stringlengths 1
118
| original_string
stringlengths 52
85.5k
| language
stringclasses 1
value | code
stringlengths 52
85.5k
| code_tokens
sequencelengths 21
1.41k
| docstring
stringlengths 6
2.61k
| docstring_tokens
sequencelengths 3
215
| sha
stringlengths 40
40
| url
stringlengths 85
252
|
---|---|---|---|---|---|---|---|---|---|---|---|
163,300 | cilium/cilium | api/v1/client/service/get_service_id_parameters.go | WithTimeout | func (o *GetServiceIDParams) WithTimeout(timeout time.Duration) *GetServiceIDParams {
o.SetTimeout(timeout)
return o
} | go | func (o *GetServiceIDParams) WithTimeout(timeout time.Duration) *GetServiceIDParams {
o.SetTimeout(timeout)
return o
} | [
"func",
"(",
"o",
"*",
"GetServiceIDParams",
")",
"WithTimeout",
"(",
"timeout",
"time",
".",
"Duration",
")",
"*",
"GetServiceIDParams",
"{",
"o",
".",
"SetTimeout",
"(",
"timeout",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithTimeout adds the timeout to the get service ID params | [
"WithTimeout",
"adds",
"the",
"timeout",
"to",
"the",
"get",
"service",
"ID",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/service/get_service_id_parameters.go#L77-L80 |
163,301 | cilium/cilium | api/v1/client/service/get_service_id_parameters.go | WithContext | func (o *GetServiceIDParams) WithContext(ctx context.Context) *GetServiceIDParams {
o.SetContext(ctx)
return o
} | go | func (o *GetServiceIDParams) WithContext(ctx context.Context) *GetServiceIDParams {
o.SetContext(ctx)
return o
} | [
"func",
"(",
"o",
"*",
"GetServiceIDParams",
")",
"WithContext",
"(",
"ctx",
"context",
".",
"Context",
")",
"*",
"GetServiceIDParams",
"{",
"o",
".",
"SetContext",
"(",
"ctx",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithContext adds the context to the get service ID params | [
"WithContext",
"adds",
"the",
"context",
"to",
"the",
"get",
"service",
"ID",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/service/get_service_id_parameters.go#L88-L91 |
163,302 | cilium/cilium | api/v1/client/service/get_service_id_parameters.go | WithHTTPClient | func (o *GetServiceIDParams) WithHTTPClient(client *http.Client) *GetServiceIDParams {
o.SetHTTPClient(client)
return o
} | go | func (o *GetServiceIDParams) WithHTTPClient(client *http.Client) *GetServiceIDParams {
o.SetHTTPClient(client)
return o
} | [
"func",
"(",
"o",
"*",
"GetServiceIDParams",
")",
"WithHTTPClient",
"(",
"client",
"*",
"http",
".",
"Client",
")",
"*",
"GetServiceIDParams",
"{",
"o",
".",
"SetHTTPClient",
"(",
"client",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithHTTPClient adds the HTTPClient to the get service ID params | [
"WithHTTPClient",
"adds",
"the",
"HTTPClient",
"to",
"the",
"get",
"service",
"ID",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/service/get_service_id_parameters.go#L99-L102 |
163,303 | cilium/cilium | api/v1/client/service/get_service_id_parameters.go | WithID | func (o *GetServiceIDParams) WithID(id int64) *GetServiceIDParams {
o.SetID(id)
return o
} | go | func (o *GetServiceIDParams) WithID(id int64) *GetServiceIDParams {
o.SetID(id)
return o
} | [
"func",
"(",
"o",
"*",
"GetServiceIDParams",
")",
"WithID",
"(",
"id",
"int64",
")",
"*",
"GetServiceIDParams",
"{",
"o",
".",
"SetID",
"(",
"id",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithID adds the id to the get service ID params | [
"WithID",
"adds",
"the",
"id",
"to",
"the",
"get",
"service",
"ID",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/service/get_service_id_parameters.go#L110-L113 |
163,304 | cilium/cilium | pkg/k8s/apis/cilium.io/utils/utils.go | GetPolicyLabels | func GetPolicyLabels(ns, name string, uid types.UID, derivedFrom string) labels.LabelArray {
// Keep labels sorted by the key.
return labels.LabelArray{
labels.NewLabel(k8sConst.PolicyLabelDerivedFrom, derivedFrom, labels.LabelSourceK8s),
labels.NewLabel(k8sConst.PolicyLabelName, name, labels.LabelSourceK8s),
labels.NewLabel(k8sConst.PolicyLabelNamespace, ns, labels.LabelSourceK8s),
labels.NewLabel(k8sConst.PolicyLabelUID, string(uid), labels.LabelSourceK8s),
}
} | go | func GetPolicyLabels(ns, name string, uid types.UID, derivedFrom string) labels.LabelArray {
// Keep labels sorted by the key.
return labels.LabelArray{
labels.NewLabel(k8sConst.PolicyLabelDerivedFrom, derivedFrom, labels.LabelSourceK8s),
labels.NewLabel(k8sConst.PolicyLabelName, name, labels.LabelSourceK8s),
labels.NewLabel(k8sConst.PolicyLabelNamespace, ns, labels.LabelSourceK8s),
labels.NewLabel(k8sConst.PolicyLabelUID, string(uid), labels.LabelSourceK8s),
}
} | [
"func",
"GetPolicyLabels",
"(",
"ns",
",",
"name",
"string",
",",
"uid",
"types",
".",
"UID",
",",
"derivedFrom",
"string",
")",
"labels",
".",
"LabelArray",
"{",
"// Keep labels sorted by the key.",
"return",
"labels",
".",
"LabelArray",
"{",
"labels",
".",
"NewLabel",
"(",
"k8sConst",
".",
"PolicyLabelDerivedFrom",
",",
"derivedFrom",
",",
"labels",
".",
"LabelSourceK8s",
")",
",",
"labels",
".",
"NewLabel",
"(",
"k8sConst",
".",
"PolicyLabelName",
",",
"name",
",",
"labels",
".",
"LabelSourceK8s",
")",
",",
"labels",
".",
"NewLabel",
"(",
"k8sConst",
".",
"PolicyLabelNamespace",
",",
"ns",
",",
"labels",
".",
"LabelSourceK8s",
")",
",",
"labels",
".",
"NewLabel",
"(",
"k8sConst",
".",
"PolicyLabelUID",
",",
"string",
"(",
"uid",
")",
",",
"labels",
".",
"LabelSourceK8s",
")",
",",
"}",
"\n",
"}"
] | // GetPolicyLabels returns a LabelArray for the given namespace and name. | [
"GetPolicyLabels",
"returns",
"a",
"LabelArray",
"for",
"the",
"given",
"namespace",
"and",
"name",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/k8s/apis/cilium.io/utils/utils.go#L55-L63 |
163,305 | cilium/cilium | pkg/k8s/apis/cilium.io/utils/utils.go | getEndpointSelector | func getEndpointSelector(namespace string, labelSelector *metav1.LabelSelector, addK8sPrefix, matchesInit bool) api.EndpointSelector {
es := api.NewESFromK8sLabelSelector("", labelSelector)
// The k8s prefix must not be added to reserved labels.
if addK8sPrefix && es.HasKeyPrefix(labels.LabelSourceReservedKeyPrefix) {
return es
}
// The user can explicitly specify the namespace in the
// FromEndpoints selector. If omitted, we limit the
// scope to the namespace the policy lives in.
//
// Policies applying on initializing pods are a special case.
// Those pods don't have any labels, so they don't have a namespace label either.
// Don't add a namespace label to those endpoint selectors, or we wouldn't be
// able to match on those pods.
if !matchesInit && !es.HasKey(podPrefixLbl) && !es.HasKey(podAnyPrefixLbl) {
es.AddMatch(podPrefixLbl, namespace)
}
return es
} | go | func getEndpointSelector(namespace string, labelSelector *metav1.LabelSelector, addK8sPrefix, matchesInit bool) api.EndpointSelector {
es := api.NewESFromK8sLabelSelector("", labelSelector)
// The k8s prefix must not be added to reserved labels.
if addK8sPrefix && es.HasKeyPrefix(labels.LabelSourceReservedKeyPrefix) {
return es
}
// The user can explicitly specify the namespace in the
// FromEndpoints selector. If omitted, we limit the
// scope to the namespace the policy lives in.
//
// Policies applying on initializing pods are a special case.
// Those pods don't have any labels, so they don't have a namespace label either.
// Don't add a namespace label to those endpoint selectors, or we wouldn't be
// able to match on those pods.
if !matchesInit && !es.HasKey(podPrefixLbl) && !es.HasKey(podAnyPrefixLbl) {
es.AddMatch(podPrefixLbl, namespace)
}
return es
} | [
"func",
"getEndpointSelector",
"(",
"namespace",
"string",
",",
"labelSelector",
"*",
"metav1",
".",
"LabelSelector",
",",
"addK8sPrefix",
",",
"matchesInit",
"bool",
")",
"api",
".",
"EndpointSelector",
"{",
"es",
":=",
"api",
".",
"NewESFromK8sLabelSelector",
"(",
"\"",
"\"",
",",
"labelSelector",
")",
"\n\n",
"// The k8s prefix must not be added to reserved labels.",
"if",
"addK8sPrefix",
"&&",
"es",
".",
"HasKeyPrefix",
"(",
"labels",
".",
"LabelSourceReservedKeyPrefix",
")",
"{",
"return",
"es",
"\n",
"}",
"\n\n",
"// The user can explicitly specify the namespace in the",
"// FromEndpoints selector. If omitted, we limit the",
"// scope to the namespace the policy lives in.",
"//",
"// Policies applying on initializing pods are a special case.",
"// Those pods don't have any labels, so they don't have a namespace label either.",
"// Don't add a namespace label to those endpoint selectors, or we wouldn't be",
"// able to match on those pods.",
"if",
"!",
"matchesInit",
"&&",
"!",
"es",
".",
"HasKey",
"(",
"podPrefixLbl",
")",
"&&",
"!",
"es",
".",
"HasKey",
"(",
"podAnyPrefixLbl",
")",
"{",
"es",
".",
"AddMatch",
"(",
"podPrefixLbl",
",",
"namespace",
")",
"\n",
"}",
"\n\n",
"return",
"es",
"\n",
"}"
] | // getEndpointSelector converts the provided labelSelector into an EndpointSelector,
// adding the relevant matches for namespaces based on the provided options. | [
"getEndpointSelector",
"converts",
"the",
"provided",
"labelSelector",
"into",
"an",
"EndpointSelector",
"adding",
"the",
"relevant",
"matches",
"for",
"namespaces",
"based",
"on",
"the",
"provided",
"options",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/k8s/apis/cilium.io/utils/utils.go#L67-L88 |
163,306 | cilium/cilium | pkg/k8s/apis/cilium.io/utils/utils.go | namespacesAreValid | func namespacesAreValid(namespace string, userNamespaces []string) bool {
return len(userNamespaces) == 0 ||
(len(userNamespaces) == 1 && userNamespaces[0] == namespace)
} | go | func namespacesAreValid(namespace string, userNamespaces []string) bool {
return len(userNamespaces) == 0 ||
(len(userNamespaces) == 1 && userNamespaces[0] == namespace)
} | [
"func",
"namespacesAreValid",
"(",
"namespace",
"string",
",",
"userNamespaces",
"[",
"]",
"string",
")",
"bool",
"{",
"return",
"len",
"(",
"userNamespaces",
")",
"==",
"0",
"||",
"(",
"len",
"(",
"userNamespaces",
")",
"==",
"1",
"&&",
"userNamespaces",
"[",
"0",
"]",
"==",
"namespace",
")",
"\n",
"}"
] | // namespacesAreValid checks the set of namespaces from a rule returns true if
// they are not specified, or if they are specified and match the namespace
// where the rule is being inserted. | [
"namespacesAreValid",
"checks",
"the",
"set",
"of",
"namespaces",
"from",
"a",
"rule",
"returns",
"true",
"if",
"they",
"are",
"not",
"specified",
"or",
"if",
"they",
"are",
"specified",
"and",
"match",
"the",
"namespace",
"where",
"the",
"rule",
"is",
"being",
"inserted",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/k8s/apis/cilium.io/utils/utils.go#L197-L200 |
163,307 | cilium/cilium | pkg/k8s/apis/cilium.io/utils/utils.go | ParseToCiliumRule | func ParseToCiliumRule(namespace, name string, uid types.UID, r *api.Rule) *api.Rule {
retRule := &api.Rule{}
if r.EndpointSelector.LabelSelector != nil {
retRule.EndpointSelector = api.NewESFromK8sLabelSelector("", r.EndpointSelector.LabelSelector)
// The PodSelector should only reflect to the same namespace
// the policy is being stored, thus we add the namespace to
// the MatchLabels map.
//
// Policies applying on initializing pods are a special case.
// Those pods don't have any labels, so they don't have a namespace label either.
// Don't add a namespace label to those endpoint selectors, or we wouldn't be
// able to match on those pods.
if !retRule.EndpointSelector.HasKey(podInitLbl) {
userNamespace, present := r.EndpointSelector.GetMatch(podPrefixLbl)
if present && !namespacesAreValid(namespace, userNamespace) {
log.WithFields(logrus.Fields{
logfields.K8sNamespace: namespace,
logfields.CiliumNetworkPolicyName: name,
logfields.K8sNamespace + ".illegal": userNamespace,
}).Warn("CiliumNetworkPolicy contains illegal namespace match in EndpointSelector." +
" EndpointSelector always applies in namespace of the policy resource, removing illegal namespace match'.")
}
retRule.EndpointSelector.AddMatch(podPrefixLbl, namespace)
}
}
parseToCiliumIngressRule(namespace, r, retRule)
parseToCiliumEgressRule(namespace, r, retRule)
retRule.Labels = ParseToCiliumLabels(namespace, name, uid, r.Labels)
retRule.Description = r.Description
return retRule
} | go | func ParseToCiliumRule(namespace, name string, uid types.UID, r *api.Rule) *api.Rule {
retRule := &api.Rule{}
if r.EndpointSelector.LabelSelector != nil {
retRule.EndpointSelector = api.NewESFromK8sLabelSelector("", r.EndpointSelector.LabelSelector)
// The PodSelector should only reflect to the same namespace
// the policy is being stored, thus we add the namespace to
// the MatchLabels map.
//
// Policies applying on initializing pods are a special case.
// Those pods don't have any labels, so they don't have a namespace label either.
// Don't add a namespace label to those endpoint selectors, or we wouldn't be
// able to match on those pods.
if !retRule.EndpointSelector.HasKey(podInitLbl) {
userNamespace, present := r.EndpointSelector.GetMatch(podPrefixLbl)
if present && !namespacesAreValid(namespace, userNamespace) {
log.WithFields(logrus.Fields{
logfields.K8sNamespace: namespace,
logfields.CiliumNetworkPolicyName: name,
logfields.K8sNamespace + ".illegal": userNamespace,
}).Warn("CiliumNetworkPolicy contains illegal namespace match in EndpointSelector." +
" EndpointSelector always applies in namespace of the policy resource, removing illegal namespace match'.")
}
retRule.EndpointSelector.AddMatch(podPrefixLbl, namespace)
}
}
parseToCiliumIngressRule(namespace, r, retRule)
parseToCiliumEgressRule(namespace, r, retRule)
retRule.Labels = ParseToCiliumLabels(namespace, name, uid, r.Labels)
retRule.Description = r.Description
return retRule
} | [
"func",
"ParseToCiliumRule",
"(",
"namespace",
",",
"name",
"string",
",",
"uid",
"types",
".",
"UID",
",",
"r",
"*",
"api",
".",
"Rule",
")",
"*",
"api",
".",
"Rule",
"{",
"retRule",
":=",
"&",
"api",
".",
"Rule",
"{",
"}",
"\n",
"if",
"r",
".",
"EndpointSelector",
".",
"LabelSelector",
"!=",
"nil",
"{",
"retRule",
".",
"EndpointSelector",
"=",
"api",
".",
"NewESFromK8sLabelSelector",
"(",
"\"",
"\"",
",",
"r",
".",
"EndpointSelector",
".",
"LabelSelector",
")",
"\n",
"// The PodSelector should only reflect to the same namespace",
"// the policy is being stored, thus we add the namespace to",
"// the MatchLabels map.",
"//",
"// Policies applying on initializing pods are a special case.",
"// Those pods don't have any labels, so they don't have a namespace label either.",
"// Don't add a namespace label to those endpoint selectors, or we wouldn't be",
"// able to match on those pods.",
"if",
"!",
"retRule",
".",
"EndpointSelector",
".",
"HasKey",
"(",
"podInitLbl",
")",
"{",
"userNamespace",
",",
"present",
":=",
"r",
".",
"EndpointSelector",
".",
"GetMatch",
"(",
"podPrefixLbl",
")",
"\n",
"if",
"present",
"&&",
"!",
"namespacesAreValid",
"(",
"namespace",
",",
"userNamespace",
")",
"{",
"log",
".",
"WithFields",
"(",
"logrus",
".",
"Fields",
"{",
"logfields",
".",
"K8sNamespace",
":",
"namespace",
",",
"logfields",
".",
"CiliumNetworkPolicyName",
":",
"name",
",",
"logfields",
".",
"K8sNamespace",
"+",
"\"",
"\"",
":",
"userNamespace",
",",
"}",
")",
".",
"Warn",
"(",
"\"",
"\"",
"+",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"retRule",
".",
"EndpointSelector",
".",
"AddMatch",
"(",
"podPrefixLbl",
",",
"namespace",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"parseToCiliumIngressRule",
"(",
"namespace",
",",
"r",
",",
"retRule",
")",
"\n",
"parseToCiliumEgressRule",
"(",
"namespace",
",",
"r",
",",
"retRule",
")",
"\n\n",
"retRule",
".",
"Labels",
"=",
"ParseToCiliumLabels",
"(",
"namespace",
",",
"name",
",",
"uid",
",",
"r",
".",
"Labels",
")",
"\n\n",
"retRule",
".",
"Description",
"=",
"r",
".",
"Description",
"\n\n",
"return",
"retRule",
"\n",
"}"
] | // ParseToCiliumRule returns an api.Rule with all the labels parsed into cilium
// labels. | [
"ParseToCiliumRule",
"returns",
"an",
"api",
".",
"Rule",
"with",
"all",
"the",
"labels",
"parsed",
"into",
"cilium",
"labels",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/k8s/apis/cilium.io/utils/utils.go#L204-L238 |
163,308 | cilium/cilium | pkg/k8s/apis/cilium.io/utils/utils.go | ParseToCiliumLabels | func ParseToCiliumLabels(namespace, name string, uid types.UID, ruleLbs labels.LabelArray) labels.LabelArray {
policyLbls := GetPolicyLabels(namespace, name, uid, ResourceTypeCiliumNetworkPolicy)
return append(policyLbls, ruleLbs...).Sort()
} | go | func ParseToCiliumLabels(namespace, name string, uid types.UID, ruleLbs labels.LabelArray) labels.LabelArray {
policyLbls := GetPolicyLabels(namespace, name, uid, ResourceTypeCiliumNetworkPolicy)
return append(policyLbls, ruleLbs...).Sort()
} | [
"func",
"ParseToCiliumLabels",
"(",
"namespace",
",",
"name",
"string",
",",
"uid",
"types",
".",
"UID",
",",
"ruleLbs",
"labels",
".",
"LabelArray",
")",
"labels",
".",
"LabelArray",
"{",
"policyLbls",
":=",
"GetPolicyLabels",
"(",
"namespace",
",",
"name",
",",
"uid",
",",
"ResourceTypeCiliumNetworkPolicy",
")",
"\n",
"return",
"append",
"(",
"policyLbls",
",",
"ruleLbs",
"...",
")",
".",
"Sort",
"(",
")",
"\n",
"}"
] | // ParseToCiliumLabels returns all ruleLbls appended with a specific label that
// represents the given namespace and name along with a label that specifies
// these labels were derived from a CiliumNetworkPolicy. | [
"ParseToCiliumLabels",
"returns",
"all",
"ruleLbls",
"appended",
"with",
"a",
"specific",
"label",
"that",
"represents",
"the",
"given",
"namespace",
"and",
"name",
"along",
"with",
"a",
"label",
"that",
"specifies",
"these",
"labels",
"were",
"derived",
"from",
"a",
"CiliumNetworkPolicy",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/k8s/apis/cilium.io/utils/utils.go#L243-L246 |
163,309 | cilium/cilium | pkg/datapath/iptables/iptables.go | Init | func (m *IptablesManager) Init() {
modulesManager := &modules.ModulesManager{}
ip6tables := true
if err := modulesManager.Init(); err != nil {
log.WithError(err).Fatal(
"Unable to get information about kernel modules")
}
if err := modulesManager.FindOrLoadModules(
"ip_tables", "iptable_nat", "iptable_mangle", "iptable_raw",
"iptable_filter"); err != nil {
log.WithError(err).Warning(
"iptables modules could not be initialized. It probably means that iptables is not available on this system")
}
if err := modulesManager.FindOrLoadModules(
"ip6_tables", "ip6table_mangle", "ip6table_raw"); err != nil {
if option.Config.EnableIPv6 {
log.WithError(err).Fatal(
"IPv6 is enabled and ip6tables modules could not be initialized")
}
log.WithError(err).Debug(
"ip6tables kernel modules could not be loaded, so IPv6 cannot be used")
ip6tables = false
}
m.ip6tables = ip6tables
} | go | func (m *IptablesManager) Init() {
modulesManager := &modules.ModulesManager{}
ip6tables := true
if err := modulesManager.Init(); err != nil {
log.WithError(err).Fatal(
"Unable to get information about kernel modules")
}
if err := modulesManager.FindOrLoadModules(
"ip_tables", "iptable_nat", "iptable_mangle", "iptable_raw",
"iptable_filter"); err != nil {
log.WithError(err).Warning(
"iptables modules could not be initialized. It probably means that iptables is not available on this system")
}
if err := modulesManager.FindOrLoadModules(
"ip6_tables", "ip6table_mangle", "ip6table_raw"); err != nil {
if option.Config.EnableIPv6 {
log.WithError(err).Fatal(
"IPv6 is enabled and ip6tables modules could not be initialized")
}
log.WithError(err).Debug(
"ip6tables kernel modules could not be loaded, so IPv6 cannot be used")
ip6tables = false
}
m.ip6tables = ip6tables
} | [
"func",
"(",
"m",
"*",
"IptablesManager",
")",
"Init",
"(",
")",
"{",
"modulesManager",
":=",
"&",
"modules",
".",
"ModulesManager",
"{",
"}",
"\n",
"ip6tables",
":=",
"true",
"\n",
"if",
"err",
":=",
"modulesManager",
".",
"Init",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"log",
".",
"WithError",
"(",
"err",
")",
".",
"Fatal",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"err",
":=",
"modulesManager",
".",
"FindOrLoadModules",
"(",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
")",
";",
"err",
"!=",
"nil",
"{",
"log",
".",
"WithError",
"(",
"err",
")",
".",
"Warning",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"err",
":=",
"modulesManager",
".",
"FindOrLoadModules",
"(",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
")",
";",
"err",
"!=",
"nil",
"{",
"if",
"option",
".",
"Config",
".",
"EnableIPv6",
"{",
"log",
".",
"WithError",
"(",
"err",
")",
".",
"Fatal",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"log",
".",
"WithError",
"(",
"err",
")",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"ip6tables",
"=",
"false",
"\n",
"}",
"\n",
"m",
".",
"ip6tables",
"=",
"ip6tables",
"\n",
"}"
] | // Init initializes the iptables manager and checks for iptables kernel modules
// availability. | [
"Init",
"initializes",
"the",
"iptables",
"manager",
"and",
"checks",
"for",
"iptables",
"kernel",
"modules",
"availability",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/iptables/iptables.go#L242-L266 |
163,310 | cilium/cilium | pkg/datapath/iptables/iptables.go | RemoveRules | func (m *IptablesManager) RemoveRules() {
// Set of tables that have had iptables rules in any Cilium version
tables := []string{"nat", "mangle", "raw", "filter"}
for _, t := range tables {
removeCiliumRules(t, "iptables")
}
// Set of tables that have had ip6tables rules in any Cilium version
if m.ip6tables {
tables6 := []string{"mangle", "raw"}
for _, t := range tables6 {
removeCiliumRules(t, "ip6tables")
}
}
for _, c := range ciliumChains {
c.remove()
}
} | go | func (m *IptablesManager) RemoveRules() {
// Set of tables that have had iptables rules in any Cilium version
tables := []string{"nat", "mangle", "raw", "filter"}
for _, t := range tables {
removeCiliumRules(t, "iptables")
}
// Set of tables that have had ip6tables rules in any Cilium version
if m.ip6tables {
tables6 := []string{"mangle", "raw"}
for _, t := range tables6 {
removeCiliumRules(t, "ip6tables")
}
}
for _, c := range ciliumChains {
c.remove()
}
} | [
"func",
"(",
"m",
"*",
"IptablesManager",
")",
"RemoveRules",
"(",
")",
"{",
"// Set of tables that have had iptables rules in any Cilium version",
"tables",
":=",
"[",
"]",
"string",
"{",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
"}",
"\n",
"for",
"_",
",",
"t",
":=",
"range",
"tables",
"{",
"removeCiliumRules",
"(",
"t",
",",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// Set of tables that have had ip6tables rules in any Cilium version",
"if",
"m",
".",
"ip6tables",
"{",
"tables6",
":=",
"[",
"]",
"string",
"{",
"\"",
"\"",
",",
"\"",
"\"",
"}",
"\n",
"for",
"_",
",",
"t",
":=",
"range",
"tables6",
"{",
"removeCiliumRules",
"(",
"t",
",",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"c",
":=",
"range",
"ciliumChains",
"{",
"c",
".",
"remove",
"(",
")",
"\n",
"}",
"\n",
"}"
] | // RemoveRules removes iptables rules installed by Cilium. | [
"RemoveRules",
"removes",
"iptables",
"rules",
"installed",
"by",
"Cilium",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/iptables/iptables.go#L269-L287 |
163,311 | cilium/cilium | pkg/datapath/iptables/iptables.go | iptProxyRules | func iptProxyRules(cmd string, proxyPort uint16, ingress bool, name string) error {
// Redirect packets to the host proxy via TPROXY, as directed by the Cilium
// datapath bpf programs via skb marks (egress) or DSCP (ingress).
if ingress {
if err := iptIngressProxyRule(cmd, "tcp", proxyPort, name); err != nil {
return err
}
if err := iptIngressProxyRule(cmd, "udp", proxyPort, name); err != nil {
return err
}
} else {
if err := iptEgressProxyRule(cmd, "tcp", proxyPort, name); err != nil {
return err
}
if err := iptEgressProxyRule(cmd, "udp", proxyPort, name); err != nil {
return err
}
}
return nil
} | go | func iptProxyRules(cmd string, proxyPort uint16, ingress bool, name string) error {
// Redirect packets to the host proxy via TPROXY, as directed by the Cilium
// datapath bpf programs via skb marks (egress) or DSCP (ingress).
if ingress {
if err := iptIngressProxyRule(cmd, "tcp", proxyPort, name); err != nil {
return err
}
if err := iptIngressProxyRule(cmd, "udp", proxyPort, name); err != nil {
return err
}
} else {
if err := iptEgressProxyRule(cmd, "tcp", proxyPort, name); err != nil {
return err
}
if err := iptEgressProxyRule(cmd, "udp", proxyPort, name); err != nil {
return err
}
}
return nil
} | [
"func",
"iptProxyRules",
"(",
"cmd",
"string",
",",
"proxyPort",
"uint16",
",",
"ingress",
"bool",
",",
"name",
"string",
")",
"error",
"{",
"// Redirect packets to the host proxy via TPROXY, as directed by the Cilium",
"// datapath bpf programs via skb marks (egress) or DSCP (ingress).",
"if",
"ingress",
"{",
"if",
"err",
":=",
"iptIngressProxyRule",
"(",
"cmd",
",",
"\"",
"\"",
",",
"proxyPort",
",",
"name",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"if",
"err",
":=",
"iptIngressProxyRule",
"(",
"cmd",
",",
"\"",
"\"",
",",
"proxyPort",
",",
"name",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"else",
"{",
"if",
"err",
":=",
"iptEgressProxyRule",
"(",
"cmd",
",",
"\"",
"\"",
",",
"proxyPort",
",",
"name",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"if",
"err",
":=",
"iptEgressProxyRule",
"(",
"cmd",
",",
"\"",
"\"",
",",
"proxyPort",
",",
"name",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // install or remove rules for a single proxy port | [
"install",
"or",
"remove",
"rules",
"for",
"a",
"single",
"proxy",
"port"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/iptables/iptables.go#L433-L452 |
163,312 | cilium/cilium | api/v1/models/endpoint_health.go | Validate | func (m *EndpointHealth) Validate(formats strfmt.Registry) error {
var res []error
if err := m.validateBpf(formats); err != nil {
res = append(res, err)
}
if err := m.validateOverallHealth(formats); err != nil {
res = append(res, err)
}
if err := m.validatePolicy(formats); err != nil {
res = append(res, err)
}
if len(res) > 0 {
return errors.CompositeValidationError(res...)
}
return nil
} | go | func (m *EndpointHealth) Validate(formats strfmt.Registry) error {
var res []error
if err := m.validateBpf(formats); err != nil {
res = append(res, err)
}
if err := m.validateOverallHealth(formats); err != nil {
res = append(res, err)
}
if err := m.validatePolicy(formats); err != nil {
res = append(res, err)
}
if len(res) > 0 {
return errors.CompositeValidationError(res...)
}
return nil
} | [
"func",
"(",
"m",
"*",
"EndpointHealth",
")",
"Validate",
"(",
"formats",
"strfmt",
".",
"Registry",
")",
"error",
"{",
"var",
"res",
"[",
"]",
"error",
"\n\n",
"if",
"err",
":=",
"m",
".",
"validateBpf",
"(",
"formats",
")",
";",
"err",
"!=",
"nil",
"{",
"res",
"=",
"append",
"(",
"res",
",",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"m",
".",
"validateOverallHealth",
"(",
"formats",
")",
";",
"err",
"!=",
"nil",
"{",
"res",
"=",
"append",
"(",
"res",
",",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"m",
".",
"validatePolicy",
"(",
"formats",
")",
";",
"err",
"!=",
"nil",
"{",
"res",
"=",
"append",
"(",
"res",
",",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"res",
")",
">",
"0",
"{",
"return",
"errors",
".",
"CompositeValidationError",
"(",
"res",
"...",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // Validate validates this endpoint health | [
"Validate",
"validates",
"this",
"endpoint",
"health"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/models/endpoint_health.go#L33-L52 |
163,313 | cilium/cilium | api/v1/models/prefilter_status.go | Validate | func (m *PrefilterStatus) Validate(formats strfmt.Registry) error {
var res []error
if err := m.validateRealized(formats); err != nil {
res = append(res, err)
}
if len(res) > 0 {
return errors.CompositeValidationError(res...)
}
return nil
} | go | func (m *PrefilterStatus) Validate(formats strfmt.Registry) error {
var res []error
if err := m.validateRealized(formats); err != nil {
res = append(res, err)
}
if len(res) > 0 {
return errors.CompositeValidationError(res...)
}
return nil
} | [
"func",
"(",
"m",
"*",
"PrefilterStatus",
")",
"Validate",
"(",
"formats",
"strfmt",
".",
"Registry",
")",
"error",
"{",
"var",
"res",
"[",
"]",
"error",
"\n\n",
"if",
"err",
":=",
"m",
".",
"validateRealized",
"(",
"formats",
")",
";",
"err",
"!=",
"nil",
"{",
"res",
"=",
"append",
"(",
"res",
",",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"res",
")",
">",
"0",
"{",
"return",
"errors",
".",
"CompositeValidationError",
"(",
"res",
"...",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // Validate validates this prefilter status | [
"Validate",
"validates",
"this",
"prefilter",
"status"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/models/prefilter_status.go#L24-L35 |
163,314 | cilium/cilium | api/v1/server/restapi/metrics/get_metrics.go | NewGetMetrics | func NewGetMetrics(ctx *middleware.Context, handler GetMetricsHandler) *GetMetrics {
return &GetMetrics{Context: ctx, Handler: handler}
} | go | func NewGetMetrics(ctx *middleware.Context, handler GetMetricsHandler) *GetMetrics {
return &GetMetrics{Context: ctx, Handler: handler}
} | [
"func",
"NewGetMetrics",
"(",
"ctx",
"*",
"middleware",
".",
"Context",
",",
"handler",
"GetMetricsHandler",
")",
"*",
"GetMetrics",
"{",
"return",
"&",
"GetMetrics",
"{",
"Context",
":",
"ctx",
",",
"Handler",
":",
"handler",
"}",
"\n",
"}"
] | // NewGetMetrics creates a new http.Handler for the get metrics operation | [
"NewGetMetrics",
"creates",
"a",
"new",
"http",
".",
"Handler",
"for",
"the",
"get",
"metrics",
"operation"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/server/restapi/metrics/get_metrics.go#L28-L30 |
163,315 | cilium/cilium | api/v1/client/ipam/post_ip_a_m_parameters.go | WithTimeout | func (o *PostIPAMParams) WithTimeout(timeout time.Duration) *PostIPAMParams {
o.SetTimeout(timeout)
return o
} | go | func (o *PostIPAMParams) WithTimeout(timeout time.Duration) *PostIPAMParams {
o.SetTimeout(timeout)
return o
} | [
"func",
"(",
"o",
"*",
"PostIPAMParams",
")",
"WithTimeout",
"(",
"timeout",
"time",
".",
"Duration",
")",
"*",
"PostIPAMParams",
"{",
"o",
".",
"SetTimeout",
"(",
"timeout",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithTimeout adds the timeout to the post IP a m params | [
"WithTimeout",
"adds",
"the",
"timeout",
"to",
"the",
"post",
"IP",
"a",
"m",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/ipam/post_ip_a_m_parameters.go#L75-L78 |
163,316 | cilium/cilium | api/v1/client/ipam/post_ip_a_m_parameters.go | WithContext | func (o *PostIPAMParams) WithContext(ctx context.Context) *PostIPAMParams {
o.SetContext(ctx)
return o
} | go | func (o *PostIPAMParams) WithContext(ctx context.Context) *PostIPAMParams {
o.SetContext(ctx)
return o
} | [
"func",
"(",
"o",
"*",
"PostIPAMParams",
")",
"WithContext",
"(",
"ctx",
"context",
".",
"Context",
")",
"*",
"PostIPAMParams",
"{",
"o",
".",
"SetContext",
"(",
"ctx",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithContext adds the context to the post IP a m params | [
"WithContext",
"adds",
"the",
"context",
"to",
"the",
"post",
"IP",
"a",
"m",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/ipam/post_ip_a_m_parameters.go#L86-L89 |
163,317 | cilium/cilium | api/v1/client/ipam/post_ip_a_m_parameters.go | WithHTTPClient | func (o *PostIPAMParams) WithHTTPClient(client *http.Client) *PostIPAMParams {
o.SetHTTPClient(client)
return o
} | go | func (o *PostIPAMParams) WithHTTPClient(client *http.Client) *PostIPAMParams {
o.SetHTTPClient(client)
return o
} | [
"func",
"(",
"o",
"*",
"PostIPAMParams",
")",
"WithHTTPClient",
"(",
"client",
"*",
"http",
".",
"Client",
")",
"*",
"PostIPAMParams",
"{",
"o",
".",
"SetHTTPClient",
"(",
"client",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithHTTPClient adds the HTTPClient to the post IP a m params | [
"WithHTTPClient",
"adds",
"the",
"HTTPClient",
"to",
"the",
"post",
"IP",
"a",
"m",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/ipam/post_ip_a_m_parameters.go#L97-L100 |
163,318 | cilium/cilium | api/v1/client/ipam/post_ip_a_m_parameters.go | WithFamily | func (o *PostIPAMParams) WithFamily(family *string) *PostIPAMParams {
o.SetFamily(family)
return o
} | go | func (o *PostIPAMParams) WithFamily(family *string) *PostIPAMParams {
o.SetFamily(family)
return o
} | [
"func",
"(",
"o",
"*",
"PostIPAMParams",
")",
"WithFamily",
"(",
"family",
"*",
"string",
")",
"*",
"PostIPAMParams",
"{",
"o",
".",
"SetFamily",
"(",
"family",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithFamily adds the family to the post IP a m params | [
"WithFamily",
"adds",
"the",
"family",
"to",
"the",
"post",
"IP",
"a",
"m",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/ipam/post_ip_a_m_parameters.go#L108-L111 |
163,319 | cilium/cilium | api/v1/client/ipam/post_ip_a_m_parameters.go | WithOwner | func (o *PostIPAMParams) WithOwner(owner *string) *PostIPAMParams {
o.SetOwner(owner)
return o
} | go | func (o *PostIPAMParams) WithOwner(owner *string) *PostIPAMParams {
o.SetOwner(owner)
return o
} | [
"func",
"(",
"o",
"*",
"PostIPAMParams",
")",
"WithOwner",
"(",
"owner",
"*",
"string",
")",
"*",
"PostIPAMParams",
"{",
"o",
".",
"SetOwner",
"(",
"owner",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithOwner adds the owner to the post IP a m params | [
"WithOwner",
"adds",
"the",
"owner",
"to",
"the",
"post",
"IP",
"a",
"m",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/ipam/post_ip_a_m_parameters.go#L119-L122 |
163,320 | cilium/cilium | pkg/policy/api/rule.go | WithEndpointSelector | func (r *Rule) WithEndpointSelector(es EndpointSelector) *Rule {
r.EndpointSelector = es
return r
} | go | func (r *Rule) WithEndpointSelector(es EndpointSelector) *Rule {
r.EndpointSelector = es
return r
} | [
"func",
"(",
"r",
"*",
"Rule",
")",
"WithEndpointSelector",
"(",
"es",
"EndpointSelector",
")",
"*",
"Rule",
"{",
"r",
".",
"EndpointSelector",
"=",
"es",
"\n",
"return",
"r",
"\n",
"}"
] | // WithEndpointSelector configures the Rule with the specified selector. | [
"WithEndpointSelector",
"configures",
"the",
"Rule",
"with",
"the",
"specified",
"selector",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/rule.go#L71-L74 |
163,321 | cilium/cilium | pkg/policy/api/rule.go | WithIngressRules | func (r *Rule) WithIngressRules(rules []IngressRule) *Rule {
r.Ingress = rules
return r
} | go | func (r *Rule) WithIngressRules(rules []IngressRule) *Rule {
r.Ingress = rules
return r
} | [
"func",
"(",
"r",
"*",
"Rule",
")",
"WithIngressRules",
"(",
"rules",
"[",
"]",
"IngressRule",
")",
"*",
"Rule",
"{",
"r",
".",
"Ingress",
"=",
"rules",
"\n",
"return",
"r",
"\n",
"}"
] | // WithIngressRules configures the Rule with the specified rules. | [
"WithIngressRules",
"configures",
"the",
"Rule",
"with",
"the",
"specified",
"rules",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/rule.go#L77-L80 |
163,322 | cilium/cilium | pkg/policy/api/rule.go | WithEgressRules | func (r *Rule) WithEgressRules(rules []EgressRule) *Rule {
r.Egress = rules
return r
} | go | func (r *Rule) WithEgressRules(rules []EgressRule) *Rule {
r.Egress = rules
return r
} | [
"func",
"(",
"r",
"*",
"Rule",
")",
"WithEgressRules",
"(",
"rules",
"[",
"]",
"EgressRule",
")",
"*",
"Rule",
"{",
"r",
".",
"Egress",
"=",
"rules",
"\n",
"return",
"r",
"\n",
"}"
] | // WithEgressRules configures the Rule with the specified rules. | [
"WithEgressRules",
"configures",
"the",
"Rule",
"with",
"the",
"specified",
"rules",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/rule.go#L83-L86 |
163,323 | cilium/cilium | pkg/policy/api/rule.go | WithLabels | func (r *Rule) WithLabels(labels labels.LabelArray) *Rule {
r.Labels = labels
return r
} | go | func (r *Rule) WithLabels(labels labels.LabelArray) *Rule {
r.Labels = labels
return r
} | [
"func",
"(",
"r",
"*",
"Rule",
")",
"WithLabels",
"(",
"labels",
"labels",
".",
"LabelArray",
")",
"*",
"Rule",
"{",
"r",
".",
"Labels",
"=",
"labels",
"\n",
"return",
"r",
"\n",
"}"
] | // WithLabels configures the Rule with the specified labels metadata. | [
"WithLabels",
"configures",
"the",
"Rule",
"with",
"the",
"specified",
"labels",
"metadata",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/rule.go#L89-L92 |
163,324 | cilium/cilium | pkg/policy/api/rule.go | WithDescription | func (r *Rule) WithDescription(desc string) *Rule {
r.Description = desc
return r
} | go | func (r *Rule) WithDescription(desc string) *Rule {
r.Description = desc
return r
} | [
"func",
"(",
"r",
"*",
"Rule",
")",
"WithDescription",
"(",
"desc",
"string",
")",
"*",
"Rule",
"{",
"r",
".",
"Description",
"=",
"desc",
"\n",
"return",
"r",
"\n",
"}"
] | // WithDescription configures the Rule with the specified description metadata. | [
"WithDescription",
"configures",
"the",
"Rule",
"with",
"the",
"specified",
"description",
"metadata",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/rule.go#L95-L98 |
163,325 | cilium/cilium | pkg/policy/api/rule.go | RequiresDerivative | func (r *Rule) RequiresDerivative() bool {
for _, rule := range r.Egress {
if rule.RequiresDerivative() {
return true
}
}
return false
} | go | func (r *Rule) RequiresDerivative() bool {
for _, rule := range r.Egress {
if rule.RequiresDerivative() {
return true
}
}
return false
} | [
"func",
"(",
"r",
"*",
"Rule",
")",
"RequiresDerivative",
"(",
")",
"bool",
"{",
"for",
"_",
",",
"rule",
":=",
"range",
"r",
".",
"Egress",
"{",
"if",
"rule",
".",
"RequiresDerivative",
"(",
")",
"{",
"return",
"true",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"false",
"\n",
"}"
] | // RequiresDerivative it return true if the rule has a derivative rule. | [
"RequiresDerivative",
"it",
"return",
"true",
"if",
"the",
"rule",
"has",
"a",
"derivative",
"rule",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/rule.go#L101-L108 |
163,326 | cilium/cilium | pkg/policy/api/rule.go | CreateDerivative | func (r *Rule) CreateDerivative() (*Rule, error) {
newRule := r.DeepCopy()
newRule.Egress = []EgressRule{}
for _, egressRule := range r.Egress {
derivativeEgressRule, err := egressRule.CreateDerivative()
if err != nil {
return newRule, err
}
newRule.Egress = append(newRule.Egress, *derivativeEgressRule)
}
return newRule, nil
} | go | func (r *Rule) CreateDerivative() (*Rule, error) {
newRule := r.DeepCopy()
newRule.Egress = []EgressRule{}
for _, egressRule := range r.Egress {
derivativeEgressRule, err := egressRule.CreateDerivative()
if err != nil {
return newRule, err
}
newRule.Egress = append(newRule.Egress, *derivativeEgressRule)
}
return newRule, nil
} | [
"func",
"(",
"r",
"*",
"Rule",
")",
"CreateDerivative",
"(",
")",
"(",
"*",
"Rule",
",",
"error",
")",
"{",
"newRule",
":=",
"r",
".",
"DeepCopy",
"(",
")",
"\n",
"newRule",
".",
"Egress",
"=",
"[",
"]",
"EgressRule",
"{",
"}",
"\n\n",
"for",
"_",
",",
"egressRule",
":=",
"range",
"r",
".",
"Egress",
"{",
"derivativeEgressRule",
",",
"err",
":=",
"egressRule",
".",
"CreateDerivative",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"newRule",
",",
"err",
"\n",
"}",
"\n",
"newRule",
".",
"Egress",
"=",
"append",
"(",
"newRule",
".",
"Egress",
",",
"*",
"derivativeEgressRule",
")",
"\n",
"}",
"\n",
"return",
"newRule",
",",
"nil",
"\n",
"}"
] | // CreateDerivative will return a new Rule with the new data based gather
// by the rules that autogenerated new Rule | [
"CreateDerivative",
"will",
"return",
"a",
"new",
"Rule",
"with",
"the",
"new",
"data",
"based",
"gather",
"by",
"the",
"rules",
"that",
"autogenerated",
"new",
"Rule"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/rule.go#L112-L124 |
163,327 | cilium/cilium | pkg/endpoint/bpf.go | PolicyMapPathLocked | func (e *Endpoint) PolicyMapPathLocked() string {
return bpf.LocalMapPath(policymap.MapName, e.ID)
} | go | func (e *Endpoint) PolicyMapPathLocked() string {
return bpf.LocalMapPath(policymap.MapName, e.ID)
} | [
"func",
"(",
"e",
"*",
"Endpoint",
")",
"PolicyMapPathLocked",
"(",
")",
"string",
"{",
"return",
"bpf",
".",
"LocalMapPath",
"(",
"policymap",
".",
"MapName",
",",
"e",
".",
"ID",
")",
"\n",
"}"
] | // PolicyMapPathLocked returns the path to the policy map of endpoint. | [
"PolicyMapPathLocked",
"returns",
"the",
"path",
"to",
"the",
"policy",
"map",
"of",
"endpoint",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/endpoint/bpf.go#L55-L57 |
163,328 | cilium/cilium | pkg/endpoint/bpf.go | CallsMapPathLocked | func (e *Endpoint) CallsMapPathLocked() string {
return bpf.LocalMapPath(loader.CallsMapName, e.ID)
} | go | func (e *Endpoint) CallsMapPathLocked() string {
return bpf.LocalMapPath(loader.CallsMapName, e.ID)
} | [
"func",
"(",
"e",
"*",
"Endpoint",
")",
"CallsMapPathLocked",
"(",
")",
"string",
"{",
"return",
"bpf",
".",
"LocalMapPath",
"(",
"loader",
".",
"CallsMapName",
",",
"e",
".",
"ID",
")",
"\n",
"}"
] | // CallsMapPathLocked returns the path to cilium tail calls map of an endpoint. | [
"CallsMapPathLocked",
"returns",
"the",
"path",
"to",
"cilium",
"tail",
"calls",
"map",
"of",
"an",
"endpoint",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/endpoint/bpf.go#L60-L62 |
163,329 | cilium/cilium | pkg/endpoint/bpf.go | BPFConfigMapPath | func (e *Endpoint) BPFConfigMapPath() string {
return bpf.LocalMapPath(bpfconfig.MapNamePrefix, e.ID)
} | go | func (e *Endpoint) BPFConfigMapPath() string {
return bpf.LocalMapPath(bpfconfig.MapNamePrefix, e.ID)
} | [
"func",
"(",
"e",
"*",
"Endpoint",
")",
"BPFConfigMapPath",
"(",
")",
"string",
"{",
"return",
"bpf",
".",
"LocalMapPath",
"(",
"bpfconfig",
".",
"MapNamePrefix",
",",
"e",
".",
"ID",
")",
"\n",
"}"
] | // BPFConfigMapPath returns the path to the BPF config map of endpoint. | [
"BPFConfigMapPath",
"returns",
"the",
"path",
"to",
"the",
"BPF",
"config",
"map",
"of",
"endpoint",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/endpoint/bpf.go#L65-L67 |
163,330 | cilium/cilium | pkg/endpoint/bpf.go | addNewRedirects | func (e *Endpoint) addNewRedirects(owner Owner, m *policy.L4Policy, proxyWaitGroup *completion.WaitGroup) (desiredRedirects map[string]bool, err error, finalizeFunc revert.FinalizeFunc, revertFunc revert.RevertFunc) {
desiredRedirects = make(map[string]bool)
var finalizeList revert.FinalizeList
var revertStack revert.RevertStack
var ff revert.FinalizeFunc
var rf revert.RevertFunc
err, ff, rf = e.addNewRedirectsFromMap(owner, m.Ingress, desiredRedirects, proxyWaitGroup)
if err != nil {
return desiredRedirects, fmt.Errorf("unable to allocate ingress redirects: %s", err), nil, nil
}
finalizeList.Append(ff)
revertStack.Push(rf)
err, ff, rf = e.addNewRedirectsFromMap(owner, m.Egress, desiredRedirects, proxyWaitGroup)
if err != nil {
revertStack.Revert() // Ignore errors while reverting. This is best-effort.
return desiredRedirects, fmt.Errorf("unable to allocate egress redirects: %s", err), nil, nil
}
finalizeList.Append(ff)
revertStack.Push(rf)
return desiredRedirects, nil, finalizeList.Finalize, func() error {
e.getLogger().Debug("Reverting proxy redirect additions")
err := revertStack.Revert()
e.getLogger().Debug("Finished reverting proxy redirect additions")
return err
}
} | go | func (e *Endpoint) addNewRedirects(owner Owner, m *policy.L4Policy, proxyWaitGroup *completion.WaitGroup) (desiredRedirects map[string]bool, err error, finalizeFunc revert.FinalizeFunc, revertFunc revert.RevertFunc) {
desiredRedirects = make(map[string]bool)
var finalizeList revert.FinalizeList
var revertStack revert.RevertStack
var ff revert.FinalizeFunc
var rf revert.RevertFunc
err, ff, rf = e.addNewRedirectsFromMap(owner, m.Ingress, desiredRedirects, proxyWaitGroup)
if err != nil {
return desiredRedirects, fmt.Errorf("unable to allocate ingress redirects: %s", err), nil, nil
}
finalizeList.Append(ff)
revertStack.Push(rf)
err, ff, rf = e.addNewRedirectsFromMap(owner, m.Egress, desiredRedirects, proxyWaitGroup)
if err != nil {
revertStack.Revert() // Ignore errors while reverting. This is best-effort.
return desiredRedirects, fmt.Errorf("unable to allocate egress redirects: %s", err), nil, nil
}
finalizeList.Append(ff)
revertStack.Push(rf)
return desiredRedirects, nil, finalizeList.Finalize, func() error {
e.getLogger().Debug("Reverting proxy redirect additions")
err := revertStack.Revert()
e.getLogger().Debug("Finished reverting proxy redirect additions")
return err
}
} | [
"func",
"(",
"e",
"*",
"Endpoint",
")",
"addNewRedirects",
"(",
"owner",
"Owner",
",",
"m",
"*",
"policy",
".",
"L4Policy",
",",
"proxyWaitGroup",
"*",
"completion",
".",
"WaitGroup",
")",
"(",
"desiredRedirects",
"map",
"[",
"string",
"]",
"bool",
",",
"err",
"error",
",",
"finalizeFunc",
"revert",
".",
"FinalizeFunc",
",",
"revertFunc",
"revert",
".",
"RevertFunc",
")",
"{",
"desiredRedirects",
"=",
"make",
"(",
"map",
"[",
"string",
"]",
"bool",
")",
"\n",
"var",
"finalizeList",
"revert",
".",
"FinalizeList",
"\n",
"var",
"revertStack",
"revert",
".",
"RevertStack",
"\n\n",
"var",
"ff",
"revert",
".",
"FinalizeFunc",
"\n",
"var",
"rf",
"revert",
".",
"RevertFunc",
"\n\n",
"err",
",",
"ff",
",",
"rf",
"=",
"e",
".",
"addNewRedirectsFromMap",
"(",
"owner",
",",
"m",
".",
"Ingress",
",",
"desiredRedirects",
",",
"proxyWaitGroup",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"desiredRedirects",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
",",
"nil",
",",
"nil",
"\n",
"}",
"\n",
"finalizeList",
".",
"Append",
"(",
"ff",
")",
"\n",
"revertStack",
".",
"Push",
"(",
"rf",
")",
"\n\n",
"err",
",",
"ff",
",",
"rf",
"=",
"e",
".",
"addNewRedirectsFromMap",
"(",
"owner",
",",
"m",
".",
"Egress",
",",
"desiredRedirects",
",",
"proxyWaitGroup",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"revertStack",
".",
"Revert",
"(",
")",
"// Ignore errors while reverting. This is best-effort.",
"\n",
"return",
"desiredRedirects",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
",",
"nil",
",",
"nil",
"\n",
"}",
"\n",
"finalizeList",
".",
"Append",
"(",
"ff",
")",
"\n",
"revertStack",
".",
"Push",
"(",
"rf",
")",
"\n\n",
"return",
"desiredRedirects",
",",
"nil",
",",
"finalizeList",
".",
"Finalize",
",",
"func",
"(",
")",
"error",
"{",
"e",
".",
"getLogger",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n\n",
"err",
":=",
"revertStack",
".",
"Revert",
"(",
")",
"\n\n",
"e",
".",
"getLogger",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n\n",
"return",
"err",
"\n",
"}",
"\n",
"}"
] | // addNewRedirects must be called while holding the endpoint lock for writing.
// On success, returns nil; otherwise, returns an error indicating the problem
// that occurred while adding an l7 redirect for the specified policy.
// The returned map contains the exact set of IDs of proxy redirects that is
// required to implement the given L4 policy.
// Must be called with endpoint.Mutex held. | [
"addNewRedirects",
"must",
"be",
"called",
"while",
"holding",
"the",
"endpoint",
"lock",
"for",
"writing",
".",
"On",
"success",
"returns",
"nil",
";",
"otherwise",
"returns",
"an",
"error",
"indicating",
"the",
"problem",
"that",
"occurred",
"while",
"adding",
"an",
"l7",
"redirect",
"for",
"the",
"specified",
"policy",
".",
"The",
"returned",
"map",
"contains",
"the",
"exact",
"set",
"of",
"IDs",
"of",
"proxy",
"redirects",
"that",
"is",
"required",
"to",
"implement",
"the",
"given",
"L4",
"policy",
".",
"Must",
"be",
"called",
"with",
"endpoint",
".",
"Mutex",
"held",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/endpoint/bpf.go#L256-L288 |
163,331 | cilium/cilium | pkg/endpoint/bpf.go | removeOldRedirects | func (e *Endpoint) removeOldRedirects(owner Owner, desiredRedirects map[string]bool, proxyWaitGroup *completion.WaitGroup) (revert.FinalizeFunc, revert.RevertFunc) {
if option.Config.DryMode {
return nil, nil
}
var finalizeList revert.FinalizeList
var revertStack revert.RevertStack
removedRedirects := make(map[string]uint16, len(e.realizedRedirects))
updatedStats := make(map[uint16]*models.ProxyStatistics, len(e.realizedRedirects))
for id, redirectPort := range e.realizedRedirects {
// Remove only the redirects that are not required.
if desiredRedirects[id] {
continue
}
err, finalizeFunc, revertFunc := owner.RemoveProxyRedirect(e, id, proxyWaitGroup)
if err != nil {
e.getLogger().WithError(err).WithField(logfields.L4PolicyID, id).Warn("Error while removing proxy redirect")
continue
}
finalizeList.Append(finalizeFunc)
revertStack.Push(revertFunc)
delete(e.realizedRedirects, id)
removedRedirects[id] = redirectPort
// Update the endpoint API model to report that no redirect is
// active or known for that port anymore. We never delete stats
// until an endpoint is deleted, so we only set the redirect port
// to 0.
//
// We don't know the L7 protocol of the redirect, so we can't just
// build a ProxyStatistics and lookup e.proxyStatistics by key.
// We have to loop to find which entry has the same redirect port.
// Looping is acceptable since there should be only a few redirects
// for each endpoint.
e.proxyStatisticsMutex.Lock()
for _, stats := range e.proxyStatistics {
if stats.AllocatedProxyPort == int64(redirectPort) {
updatedStats[redirectPort] = stats
stats.AllocatedProxyPort = 0
break
}
}
e.proxyStatisticsMutex.Unlock()
}
return finalizeList.Finalize,
func() error {
e.getLogger().Debug("Reverting proxy redirect removals")
// Restore the proxy stats.
e.proxyStatisticsMutex.Lock()
for redirectPort, stats := range updatedStats {
stats.AllocatedProxyPort = int64(redirectPort)
}
e.proxyStatisticsMutex.Unlock()
for id, redirectPort := range removedRedirects {
e.realizedRedirects[id] = redirectPort
}
err := revertStack.Revert()
e.getLogger().Debug("Finished reverting proxy redirect removals")
return err
}
} | go | func (e *Endpoint) removeOldRedirects(owner Owner, desiredRedirects map[string]bool, proxyWaitGroup *completion.WaitGroup) (revert.FinalizeFunc, revert.RevertFunc) {
if option.Config.DryMode {
return nil, nil
}
var finalizeList revert.FinalizeList
var revertStack revert.RevertStack
removedRedirects := make(map[string]uint16, len(e.realizedRedirects))
updatedStats := make(map[uint16]*models.ProxyStatistics, len(e.realizedRedirects))
for id, redirectPort := range e.realizedRedirects {
// Remove only the redirects that are not required.
if desiredRedirects[id] {
continue
}
err, finalizeFunc, revertFunc := owner.RemoveProxyRedirect(e, id, proxyWaitGroup)
if err != nil {
e.getLogger().WithError(err).WithField(logfields.L4PolicyID, id).Warn("Error while removing proxy redirect")
continue
}
finalizeList.Append(finalizeFunc)
revertStack.Push(revertFunc)
delete(e.realizedRedirects, id)
removedRedirects[id] = redirectPort
// Update the endpoint API model to report that no redirect is
// active or known for that port anymore. We never delete stats
// until an endpoint is deleted, so we only set the redirect port
// to 0.
//
// We don't know the L7 protocol of the redirect, so we can't just
// build a ProxyStatistics and lookup e.proxyStatistics by key.
// We have to loop to find which entry has the same redirect port.
// Looping is acceptable since there should be only a few redirects
// for each endpoint.
e.proxyStatisticsMutex.Lock()
for _, stats := range e.proxyStatistics {
if stats.AllocatedProxyPort == int64(redirectPort) {
updatedStats[redirectPort] = stats
stats.AllocatedProxyPort = 0
break
}
}
e.proxyStatisticsMutex.Unlock()
}
return finalizeList.Finalize,
func() error {
e.getLogger().Debug("Reverting proxy redirect removals")
// Restore the proxy stats.
e.proxyStatisticsMutex.Lock()
for redirectPort, stats := range updatedStats {
stats.AllocatedProxyPort = int64(redirectPort)
}
e.proxyStatisticsMutex.Unlock()
for id, redirectPort := range removedRedirects {
e.realizedRedirects[id] = redirectPort
}
err := revertStack.Revert()
e.getLogger().Debug("Finished reverting proxy redirect removals")
return err
}
} | [
"func",
"(",
"e",
"*",
"Endpoint",
")",
"removeOldRedirects",
"(",
"owner",
"Owner",
",",
"desiredRedirects",
"map",
"[",
"string",
"]",
"bool",
",",
"proxyWaitGroup",
"*",
"completion",
".",
"WaitGroup",
")",
"(",
"revert",
".",
"FinalizeFunc",
",",
"revert",
".",
"RevertFunc",
")",
"{",
"if",
"option",
".",
"Config",
".",
"DryMode",
"{",
"return",
"nil",
",",
"nil",
"\n",
"}",
"\n\n",
"var",
"finalizeList",
"revert",
".",
"FinalizeList",
"\n",
"var",
"revertStack",
"revert",
".",
"RevertStack",
"\n",
"removedRedirects",
":=",
"make",
"(",
"map",
"[",
"string",
"]",
"uint16",
",",
"len",
"(",
"e",
".",
"realizedRedirects",
")",
")",
"\n",
"updatedStats",
":=",
"make",
"(",
"map",
"[",
"uint16",
"]",
"*",
"models",
".",
"ProxyStatistics",
",",
"len",
"(",
"e",
".",
"realizedRedirects",
")",
")",
"\n\n",
"for",
"id",
",",
"redirectPort",
":=",
"range",
"e",
".",
"realizedRedirects",
"{",
"// Remove only the redirects that are not required.",
"if",
"desiredRedirects",
"[",
"id",
"]",
"{",
"continue",
"\n",
"}",
"\n\n",
"err",
",",
"finalizeFunc",
",",
"revertFunc",
":=",
"owner",
".",
"RemoveProxyRedirect",
"(",
"e",
",",
"id",
",",
"proxyWaitGroup",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"e",
".",
"getLogger",
"(",
")",
".",
"WithError",
"(",
"err",
")",
".",
"WithField",
"(",
"logfields",
".",
"L4PolicyID",
",",
"id",
")",
".",
"Warn",
"(",
"\"",
"\"",
")",
"\n",
"continue",
"\n",
"}",
"\n",
"finalizeList",
".",
"Append",
"(",
"finalizeFunc",
")",
"\n",
"revertStack",
".",
"Push",
"(",
"revertFunc",
")",
"\n\n",
"delete",
"(",
"e",
".",
"realizedRedirects",
",",
"id",
")",
"\n",
"removedRedirects",
"[",
"id",
"]",
"=",
"redirectPort",
"\n\n",
"// Update the endpoint API model to report that no redirect is",
"// active or known for that port anymore. We never delete stats",
"// until an endpoint is deleted, so we only set the redirect port",
"// to 0.",
"//",
"// We don't know the L7 protocol of the redirect, so we can't just",
"// build a ProxyStatistics and lookup e.proxyStatistics by key.",
"// We have to loop to find which entry has the same redirect port.",
"// Looping is acceptable since there should be only a few redirects",
"// for each endpoint.",
"e",
".",
"proxyStatisticsMutex",
".",
"Lock",
"(",
")",
"\n",
"for",
"_",
",",
"stats",
":=",
"range",
"e",
".",
"proxyStatistics",
"{",
"if",
"stats",
".",
"AllocatedProxyPort",
"==",
"int64",
"(",
"redirectPort",
")",
"{",
"updatedStats",
"[",
"redirectPort",
"]",
"=",
"stats",
"\n",
"stats",
".",
"AllocatedProxyPort",
"=",
"0",
"\n",
"break",
"\n",
"}",
"\n",
"}",
"\n",
"e",
".",
"proxyStatisticsMutex",
".",
"Unlock",
"(",
")",
"\n",
"}",
"\n\n",
"return",
"finalizeList",
".",
"Finalize",
",",
"func",
"(",
")",
"error",
"{",
"e",
".",
"getLogger",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n\n",
"// Restore the proxy stats.",
"e",
".",
"proxyStatisticsMutex",
".",
"Lock",
"(",
")",
"\n",
"for",
"redirectPort",
",",
"stats",
":=",
"range",
"updatedStats",
"{",
"stats",
".",
"AllocatedProxyPort",
"=",
"int64",
"(",
"redirectPort",
")",
"\n",
"}",
"\n",
"e",
".",
"proxyStatisticsMutex",
".",
"Unlock",
"(",
")",
"\n\n",
"for",
"id",
",",
"redirectPort",
":=",
"range",
"removedRedirects",
"{",
"e",
".",
"realizedRedirects",
"[",
"id",
"]",
"=",
"redirectPort",
"\n",
"}",
"\n\n",
"err",
":=",
"revertStack",
".",
"Revert",
"(",
")",
"\n\n",
"e",
".",
"getLogger",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n\n",
"return",
"err",
"\n",
"}",
"\n",
"}"
] | // Must be called with endpoint.Mutex held. | [
"Must",
"be",
"called",
"with",
"endpoint",
".",
"Mutex",
"held",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/endpoint/bpf.go#L291-L360 |
163,332 | cilium/cilium | pkg/endpoint/bpf.go | DeleteMapsLocked | func (e *Endpoint) DeleteMapsLocked() []error {
var errors []error
maps := map[string]string{
"config": e.BPFConfigMapPath(),
"policy": e.PolicyMapPathLocked(),
"calls": e.CallsMapPathLocked(),
"egress": e.BPFIpvlanMapPath(),
}
for name, path := range maps {
if err := os.RemoveAll(path); err != nil {
errors = append(errors, fmt.Errorf("unable to remove %s map file %s: %s", name, path, err))
}
}
if e.ConntrackLocalLocked() {
// Remove local connection tracking maps
for _, m := range ctmap.LocalMaps(e, option.Config.EnableIPv4, option.Config.EnableIPv6) {
ctPath, err := m.Path()
if err == nil {
err = os.RemoveAll(ctPath)
}
if err != nil {
errors = append(errors, fmt.Errorf("unable to remove CT map %s: %s", ctPath, err))
}
}
}
// Remove handle_policy() tail call entry for EP
if err := policymap.RemoveGlobalMapping(uint32(e.ID)); err != nil {
errors = append(errors, fmt.Errorf("unable to remove endpoint from global policy map: %s", err))
}
return errors
} | go | func (e *Endpoint) DeleteMapsLocked() []error {
var errors []error
maps := map[string]string{
"config": e.BPFConfigMapPath(),
"policy": e.PolicyMapPathLocked(),
"calls": e.CallsMapPathLocked(),
"egress": e.BPFIpvlanMapPath(),
}
for name, path := range maps {
if err := os.RemoveAll(path); err != nil {
errors = append(errors, fmt.Errorf("unable to remove %s map file %s: %s", name, path, err))
}
}
if e.ConntrackLocalLocked() {
// Remove local connection tracking maps
for _, m := range ctmap.LocalMaps(e, option.Config.EnableIPv4, option.Config.EnableIPv6) {
ctPath, err := m.Path()
if err == nil {
err = os.RemoveAll(ctPath)
}
if err != nil {
errors = append(errors, fmt.Errorf("unable to remove CT map %s: %s", ctPath, err))
}
}
}
// Remove handle_policy() tail call entry for EP
if err := policymap.RemoveGlobalMapping(uint32(e.ID)); err != nil {
errors = append(errors, fmt.Errorf("unable to remove endpoint from global policy map: %s", err))
}
return errors
} | [
"func",
"(",
"e",
"*",
"Endpoint",
")",
"DeleteMapsLocked",
"(",
")",
"[",
"]",
"error",
"{",
"var",
"errors",
"[",
"]",
"error",
"\n\n",
"maps",
":=",
"map",
"[",
"string",
"]",
"string",
"{",
"\"",
"\"",
":",
"e",
".",
"BPFConfigMapPath",
"(",
")",
",",
"\"",
"\"",
":",
"e",
".",
"PolicyMapPathLocked",
"(",
")",
",",
"\"",
"\"",
":",
"e",
".",
"CallsMapPathLocked",
"(",
")",
",",
"\"",
"\"",
":",
"e",
".",
"BPFIpvlanMapPath",
"(",
")",
",",
"}",
"\n",
"for",
"name",
",",
"path",
":=",
"range",
"maps",
"{",
"if",
"err",
":=",
"os",
".",
"RemoveAll",
"(",
"path",
")",
";",
"err",
"!=",
"nil",
"{",
"errors",
"=",
"append",
"(",
"errors",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"name",
",",
"path",
",",
"err",
")",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"e",
".",
"ConntrackLocalLocked",
"(",
")",
"{",
"// Remove local connection tracking maps",
"for",
"_",
",",
"m",
":=",
"range",
"ctmap",
".",
"LocalMaps",
"(",
"e",
",",
"option",
".",
"Config",
".",
"EnableIPv4",
",",
"option",
".",
"Config",
".",
"EnableIPv6",
")",
"{",
"ctPath",
",",
"err",
":=",
"m",
".",
"Path",
"(",
")",
"\n",
"if",
"err",
"==",
"nil",
"{",
"err",
"=",
"os",
".",
"RemoveAll",
"(",
"ctPath",
")",
"\n",
"}",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"errors",
"=",
"append",
"(",
"errors",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"ctPath",
",",
"err",
")",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n\n",
"// Remove handle_policy() tail call entry for EP",
"if",
"err",
":=",
"policymap",
".",
"RemoveGlobalMapping",
"(",
"uint32",
"(",
"e",
".",
"ID",
")",
")",
";",
"err",
"!=",
"nil",
"{",
"errors",
"=",
"append",
"(",
"errors",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
")",
"\n",
"}",
"\n\n",
"return",
"errors",
"\n",
"}"
] | // DeleteMapsLocked releases references to all BPF maps associated with this
// endpoint.
//
// For each error that occurs while releasing these references, an error is
// added to the resulting error slice which is returned.
//
// Returns nil on success. | [
"DeleteMapsLocked",
"releases",
"references",
"to",
"all",
"BPF",
"maps",
"associated",
"with",
"this",
"endpoint",
".",
"For",
"each",
"error",
"that",
"occurs",
"while",
"releasing",
"these",
"references",
"an",
"error",
"is",
"added",
"to",
"the",
"resulting",
"error",
"slice",
"which",
"is",
"returned",
".",
"Returns",
"nil",
"on",
"success",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/endpoint/bpf.go#L769-L803 |
163,333 | cilium/cilium | pkg/endpoint/bpf.go | DeleteBPFProgramLocked | func (e *Endpoint) DeleteBPFProgramLocked() error {
e.getLogger().Debug("deleting bpf program from endpoint")
return loader.DeleteDatapath(context.TODO(), e.IfName, "ingress")
} | go | func (e *Endpoint) DeleteBPFProgramLocked() error {
e.getLogger().Debug("deleting bpf program from endpoint")
return loader.DeleteDatapath(context.TODO(), e.IfName, "ingress")
} | [
"func",
"(",
"e",
"*",
"Endpoint",
")",
"DeleteBPFProgramLocked",
"(",
")",
"error",
"{",
"e",
".",
"getLogger",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"return",
"loader",
".",
"DeleteDatapath",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"e",
".",
"IfName",
",",
"\"",
"\"",
")",
"\n",
"}"
] | // DeleteBPFProgramLocked delete the BPF program associated with the endpoint's
// veth interface. | [
"DeleteBPFProgramLocked",
"delete",
"the",
"BPF",
"program",
"associated",
"with",
"the",
"endpoint",
"s",
"veth",
"interface",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/endpoint/bpf.go#L807-L810 |
163,334 | cilium/cilium | pkg/endpoint/bpf.go | SkipStateClean | func (e *Endpoint) SkipStateClean() {
// Mark conntrack as already cleaned
e.UnconditionalLock()
e.ctCleaned = true
e.Unlock()
} | go | func (e *Endpoint) SkipStateClean() {
// Mark conntrack as already cleaned
e.UnconditionalLock()
e.ctCleaned = true
e.Unlock()
} | [
"func",
"(",
"e",
"*",
"Endpoint",
")",
"SkipStateClean",
"(",
")",
"{",
"// Mark conntrack as already cleaned",
"e",
".",
"UnconditionalLock",
"(",
")",
"\n",
"e",
".",
"ctCleaned",
"=",
"true",
"\n",
"e",
".",
"Unlock",
"(",
")",
"\n",
"}"
] | // SkipStateClean can be called on a endpoint before its first build to skip
// the cleaning of state such as the conntrack table. This is useful when an
// endpoint is being restored from state and the datapath state should not be
// claned.
//
// The endpoint lock must NOT be held. | [
"SkipStateClean",
"can",
"be",
"called",
"on",
"a",
"endpoint",
"before",
"its",
"first",
"build",
"to",
"skip",
"the",
"cleaning",
"of",
"state",
"such",
"as",
"the",
"conntrack",
"table",
".",
"This",
"is",
"useful",
"when",
"an",
"endpoint",
"is",
"being",
"restored",
"from",
"state",
"and",
"the",
"datapath",
"state",
"should",
"not",
"be",
"claned",
".",
"The",
"endpoint",
"lock",
"must",
"NOT",
"be",
"held",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/endpoint/bpf.go#L862-L867 |
163,335 | cilium/cilium | pkg/endpoint/bpf.go | GetBPFKeys | func (e *Endpoint) GetBPFKeys() []*lxcmap.EndpointKey {
keys := []*lxcmap.EndpointKey{}
if e.IPv6.IsSet() {
keys = append(keys, lxcmap.NewEndpointKey(e.IPv6.IP()))
}
if e.IPv4.IsSet() {
keys = append(keys, lxcmap.NewEndpointKey(e.IPv4.IP()))
}
return keys
} | go | func (e *Endpoint) GetBPFKeys() []*lxcmap.EndpointKey {
keys := []*lxcmap.EndpointKey{}
if e.IPv6.IsSet() {
keys = append(keys, lxcmap.NewEndpointKey(e.IPv6.IP()))
}
if e.IPv4.IsSet() {
keys = append(keys, lxcmap.NewEndpointKey(e.IPv4.IP()))
}
return keys
} | [
"func",
"(",
"e",
"*",
"Endpoint",
")",
"GetBPFKeys",
"(",
")",
"[",
"]",
"*",
"lxcmap",
".",
"EndpointKey",
"{",
"keys",
":=",
"[",
"]",
"*",
"lxcmap",
".",
"EndpointKey",
"{",
"}",
"\n",
"if",
"e",
".",
"IPv6",
".",
"IsSet",
"(",
")",
"{",
"keys",
"=",
"append",
"(",
"keys",
",",
"lxcmap",
".",
"NewEndpointKey",
"(",
"e",
".",
"IPv6",
".",
"IP",
"(",
")",
")",
")",
"\n",
"}",
"\n\n",
"if",
"e",
".",
"IPv4",
".",
"IsSet",
"(",
")",
"{",
"keys",
"=",
"append",
"(",
"keys",
",",
"lxcmap",
".",
"NewEndpointKey",
"(",
"e",
".",
"IPv4",
".",
"IP",
"(",
")",
")",
")",
"\n",
"}",
"\n\n",
"return",
"keys",
"\n",
"}"
] | // GetBPFKeys returns all keys which should represent this endpoint in the BPF
// endpoints map | [
"GetBPFKeys",
"returns",
"all",
"keys",
"which",
"should",
"represent",
"this",
"endpoint",
"in",
"the",
"BPF",
"endpoints",
"map"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/endpoint/bpf.go#L871-L882 |
163,336 | cilium/cilium | pkg/endpoint/bpf.go | GetBPFValue | func (e *Endpoint) GetBPFValue() (*lxcmap.EndpointInfo, error) {
mac, err := e.LXCMAC.Uint64()
if err != nil {
return nil, fmt.Errorf("invalid LXC MAC: %v", err)
}
nodeMAC, err := e.NodeMAC.Uint64()
if err != nil {
return nil, fmt.Errorf("invalid node MAC: %v", err)
}
info := &lxcmap.EndpointInfo{
IfIndex: uint32(e.IfIndex),
// Store security identity in network byte order so it can be
// written into the packet without an additional byte order
// conversion.
LxcID: e.ID,
MAC: lxcmap.MAC(mac),
NodeMAC: lxcmap.MAC(nodeMAC),
}
return info, nil
} | go | func (e *Endpoint) GetBPFValue() (*lxcmap.EndpointInfo, error) {
mac, err := e.LXCMAC.Uint64()
if err != nil {
return nil, fmt.Errorf("invalid LXC MAC: %v", err)
}
nodeMAC, err := e.NodeMAC.Uint64()
if err != nil {
return nil, fmt.Errorf("invalid node MAC: %v", err)
}
info := &lxcmap.EndpointInfo{
IfIndex: uint32(e.IfIndex),
// Store security identity in network byte order so it can be
// written into the packet without an additional byte order
// conversion.
LxcID: e.ID,
MAC: lxcmap.MAC(mac),
NodeMAC: lxcmap.MAC(nodeMAC),
}
return info, nil
} | [
"func",
"(",
"e",
"*",
"Endpoint",
")",
"GetBPFValue",
"(",
")",
"(",
"*",
"lxcmap",
".",
"EndpointInfo",
",",
"error",
")",
"{",
"mac",
",",
"err",
":=",
"e",
".",
"LXCMAC",
".",
"Uint64",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"nodeMAC",
",",
"err",
":=",
"e",
".",
"NodeMAC",
".",
"Uint64",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"info",
":=",
"&",
"lxcmap",
".",
"EndpointInfo",
"{",
"IfIndex",
":",
"uint32",
"(",
"e",
".",
"IfIndex",
")",
",",
"// Store security identity in network byte order so it can be",
"// written into the packet without an additional byte order",
"// conversion.",
"LxcID",
":",
"e",
".",
"ID",
",",
"MAC",
":",
"lxcmap",
".",
"MAC",
"(",
"mac",
")",
",",
"NodeMAC",
":",
"lxcmap",
".",
"MAC",
"(",
"nodeMAC",
")",
",",
"}",
"\n\n",
"return",
"info",
",",
"nil",
"\n",
"}"
] | // GetBPFValue returns the value which should represent this endpoint in the
// BPF endpoints map | [
"GetBPFValue",
"returns",
"the",
"value",
"which",
"should",
"represent",
"this",
"endpoint",
"in",
"the",
"BPF",
"endpoints",
"map"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/endpoint/bpf.go#L886-L908 |
163,337 | cilium/cilium | pkg/status/status.go | NewCollector | func NewCollector(probes []Probe, config Config) *Collector {
c := &Collector{
config: config,
stop: make(chan struct{}, 0),
staleProbes: make(map[string]struct{}),
probeStartTime: make(map[string]time.Time),
}
if c.config.Interval == time.Duration(0) {
c.config.Interval = defaults.StatusCollectorInterval
}
if c.config.FailureThreshold == time.Duration(0) {
c.config.FailureThreshold = defaults.StatusCollectorFailureThreshold
}
if c.config.WarningThreshold == time.Duration(0) {
c.config.WarningThreshold = defaults.StatusCollectorWarningThreshold
}
for i := range probes {
c.spawnProbe(&probes[i])
}
return c
} | go | func NewCollector(probes []Probe, config Config) *Collector {
c := &Collector{
config: config,
stop: make(chan struct{}, 0),
staleProbes: make(map[string]struct{}),
probeStartTime: make(map[string]time.Time),
}
if c.config.Interval == time.Duration(0) {
c.config.Interval = defaults.StatusCollectorInterval
}
if c.config.FailureThreshold == time.Duration(0) {
c.config.FailureThreshold = defaults.StatusCollectorFailureThreshold
}
if c.config.WarningThreshold == time.Duration(0) {
c.config.WarningThreshold = defaults.StatusCollectorWarningThreshold
}
for i := range probes {
c.spawnProbe(&probes[i])
}
return c
} | [
"func",
"NewCollector",
"(",
"probes",
"[",
"]",
"Probe",
",",
"config",
"Config",
")",
"*",
"Collector",
"{",
"c",
":=",
"&",
"Collector",
"{",
"config",
":",
"config",
",",
"stop",
":",
"make",
"(",
"chan",
"struct",
"{",
"}",
",",
"0",
")",
",",
"staleProbes",
":",
"make",
"(",
"map",
"[",
"string",
"]",
"struct",
"{",
"}",
")",
",",
"probeStartTime",
":",
"make",
"(",
"map",
"[",
"string",
"]",
"time",
".",
"Time",
")",
",",
"}",
"\n\n",
"if",
"c",
".",
"config",
".",
"Interval",
"==",
"time",
".",
"Duration",
"(",
"0",
")",
"{",
"c",
".",
"config",
".",
"Interval",
"=",
"defaults",
".",
"StatusCollectorInterval",
"\n",
"}",
"\n\n",
"if",
"c",
".",
"config",
".",
"FailureThreshold",
"==",
"time",
".",
"Duration",
"(",
"0",
")",
"{",
"c",
".",
"config",
".",
"FailureThreshold",
"=",
"defaults",
".",
"StatusCollectorFailureThreshold",
"\n",
"}",
"\n\n",
"if",
"c",
".",
"config",
".",
"WarningThreshold",
"==",
"time",
".",
"Duration",
"(",
"0",
")",
"{",
"c",
".",
"config",
".",
"WarningThreshold",
"=",
"defaults",
".",
"StatusCollectorWarningThreshold",
"\n",
"}",
"\n\n",
"for",
"i",
":=",
"range",
"probes",
"{",
"c",
".",
"spawnProbe",
"(",
"&",
"probes",
"[",
"i",
"]",
")",
"\n",
"}",
"\n\n",
"return",
"c",
"\n",
"}"
] | // NewCollector creates a collector and starts the given probes.
//
// Each probe runs in a separate goroutine. | [
"NewCollector",
"creates",
"a",
"collector",
"and",
"starts",
"the",
"given",
"probes",
".",
"Each",
"probe",
"runs",
"in",
"a",
"separate",
"goroutine",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/status/status.go#L91-L116 |
163,338 | cilium/cilium | pkg/status/status.go | GetStaleProbes | func (c *Collector) GetStaleProbes() map[string]time.Time {
c.RLock()
defer c.RUnlock()
probes := make(map[string]time.Time)
for p := range c.staleProbes {
probes[p] = c.probeStartTime[p]
}
return probes
} | go | func (c *Collector) GetStaleProbes() map[string]time.Time {
c.RLock()
defer c.RUnlock()
probes := make(map[string]time.Time)
for p := range c.staleProbes {
probes[p] = c.probeStartTime[p]
}
return probes
} | [
"func",
"(",
"c",
"*",
"Collector",
")",
"GetStaleProbes",
"(",
")",
"map",
"[",
"string",
"]",
"time",
".",
"Time",
"{",
"c",
".",
"RLock",
"(",
")",
"\n",
"defer",
"c",
".",
"RUnlock",
"(",
")",
"\n\n",
"probes",
":=",
"make",
"(",
"map",
"[",
"string",
"]",
"time",
".",
"Time",
")",
"\n\n",
"for",
"p",
":=",
"range",
"c",
".",
"staleProbes",
"{",
"probes",
"[",
"p",
"]",
"=",
"c",
".",
"probeStartTime",
"[",
"p",
"]",
"\n",
"}",
"\n\n",
"return",
"probes",
"\n",
"}"
] | // GetStaleProbes returns a map of stale probes which key is a probe name and
// value is a time when the last instance of the probe has been started.
//
// A probe is declared stale if it hasn't returned in FailureThreshold. | [
"GetStaleProbes",
"returns",
"a",
"map",
"of",
"stale",
"probes",
"which",
"key",
"is",
"a",
"probe",
"name",
"and",
"value",
"is",
"a",
"time",
"when",
"the",
"last",
"instance",
"of",
"the",
"probe",
"has",
"been",
"started",
".",
"A",
"probe",
"is",
"declared",
"stale",
"if",
"it",
"hasn",
"t",
"returned",
"in",
"FailureThreshold",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/status/status.go#L128-L139 |
163,339 | cilium/cilium | pkg/status/status.go | spawnProbe | func (c *Collector) spawnProbe(p *Probe) {
go func() {
for {
c.runProbe(p)
interval := c.config.Interval
if p.Interval != nil {
interval = p.Interval(p.consecutiveFailures)
}
select {
case <-c.stop:
// collector is closed, stop looping
return
case <-time.After(interval):
// keep looping
}
}
}()
} | go | func (c *Collector) spawnProbe(p *Probe) {
go func() {
for {
c.runProbe(p)
interval := c.config.Interval
if p.Interval != nil {
interval = p.Interval(p.consecutiveFailures)
}
select {
case <-c.stop:
// collector is closed, stop looping
return
case <-time.After(interval):
// keep looping
}
}
}()
} | [
"func",
"(",
"c",
"*",
"Collector",
")",
"spawnProbe",
"(",
"p",
"*",
"Probe",
")",
"{",
"go",
"func",
"(",
")",
"{",
"for",
"{",
"c",
".",
"runProbe",
"(",
"p",
")",
"\n\n",
"interval",
":=",
"c",
".",
"config",
".",
"Interval",
"\n",
"if",
"p",
".",
"Interval",
"!=",
"nil",
"{",
"interval",
"=",
"p",
".",
"Interval",
"(",
"p",
".",
"consecutiveFailures",
")",
"\n",
"}",
"\n\n",
"select",
"{",
"case",
"<-",
"c",
".",
"stop",
":",
"// collector is closed, stop looping",
"return",
"\n",
"case",
"<-",
"time",
".",
"After",
"(",
"interval",
")",
":",
"// keep looping",
"}",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n",
"}"
] | // spawnProbe starts a goroutine which invokes the probe at the particular interval. | [
"spawnProbe",
"starts",
"a",
"goroutine",
"which",
"invokes",
"the",
"probe",
"at",
"the",
"particular",
"interval",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/status/status.go#L142-L161 |
163,340 | cilium/cilium | pkg/status/status.go | runProbe | func (c *Collector) runProbe(p *Probe) {
var (
statusData interface{}
err error
warningThreshold = time.After(c.config.WarningThreshold)
hardTimeout = false
probeReturned = make(chan struct{}, 1)
ctx, cancel = context.WithTimeout(context.Background(), c.config.FailureThreshold)
ctxTimeout = make(chan struct{}, 1)
)
c.Lock()
c.probeStartTime[p.Name] = time.Now()
c.Unlock()
go func() {
statusData, err = p.Probe(ctx)
close(probeReturned)
}()
go func() {
// Once ctx.Done() has been closed, we notify the polling loop by
// sending to the ctxTimeout channel. We cannot just close the channel,
// because otherwise the loop will always enter the "<-ctxTimeout" case.
<-ctx.Done()
ctxTimeout <- struct{}{}
}()
// This is a loop so that, when we hit a FailureThreshold, we still do
// not return until the probe returns. This is to ensure the same probe
// does not run again while it is blocked.
for {
select {
case <-c.stop:
// Collector was closed. The probe will complete in the background
// and won't be restarted again.
cancel()
return
case <-warningThreshold:
// Just warn and continue waiting for probe
log.WithField(logfields.Probe, p.Name).
Warnf("No response from probe within %v seconds",
c.config.WarningThreshold.Seconds())
case <-probeReturned:
// The probe completed and we can return from runProbe
switch {
case hardTimeout:
// FailureThreshold was already reached. Keep the failure error
// message
case err != nil:
c.updateProbeStatus(p, nil, false, err)
default:
c.updateProbeStatus(p, statusData, false, nil)
}
cancel()
return
case <-ctxTimeout:
// We have timed out. Report a status and mark that we timed out so we
// do not emit status later.
staleErr := fmt.Errorf("No response from %s probe within %v seconds",
p.Name, c.config.FailureThreshold.Seconds())
c.updateProbeStatus(p, nil, true, staleErr)
hardTimeout = true
}
}
} | go | func (c *Collector) runProbe(p *Probe) {
var (
statusData interface{}
err error
warningThreshold = time.After(c.config.WarningThreshold)
hardTimeout = false
probeReturned = make(chan struct{}, 1)
ctx, cancel = context.WithTimeout(context.Background(), c.config.FailureThreshold)
ctxTimeout = make(chan struct{}, 1)
)
c.Lock()
c.probeStartTime[p.Name] = time.Now()
c.Unlock()
go func() {
statusData, err = p.Probe(ctx)
close(probeReturned)
}()
go func() {
// Once ctx.Done() has been closed, we notify the polling loop by
// sending to the ctxTimeout channel. We cannot just close the channel,
// because otherwise the loop will always enter the "<-ctxTimeout" case.
<-ctx.Done()
ctxTimeout <- struct{}{}
}()
// This is a loop so that, when we hit a FailureThreshold, we still do
// not return until the probe returns. This is to ensure the same probe
// does not run again while it is blocked.
for {
select {
case <-c.stop:
// Collector was closed. The probe will complete in the background
// and won't be restarted again.
cancel()
return
case <-warningThreshold:
// Just warn and continue waiting for probe
log.WithField(logfields.Probe, p.Name).
Warnf("No response from probe within %v seconds",
c.config.WarningThreshold.Seconds())
case <-probeReturned:
// The probe completed and we can return from runProbe
switch {
case hardTimeout:
// FailureThreshold was already reached. Keep the failure error
// message
case err != nil:
c.updateProbeStatus(p, nil, false, err)
default:
c.updateProbeStatus(p, statusData, false, nil)
}
cancel()
return
case <-ctxTimeout:
// We have timed out. Report a status and mark that we timed out so we
// do not emit status later.
staleErr := fmt.Errorf("No response from %s probe within %v seconds",
p.Name, c.config.FailureThreshold.Seconds())
c.updateProbeStatus(p, nil, true, staleErr)
hardTimeout = true
}
}
} | [
"func",
"(",
"c",
"*",
"Collector",
")",
"runProbe",
"(",
"p",
"*",
"Probe",
")",
"{",
"var",
"(",
"statusData",
"interface",
"{",
"}",
"\n",
"err",
"error",
"\n",
"warningThreshold",
"=",
"time",
".",
"After",
"(",
"c",
".",
"config",
".",
"WarningThreshold",
")",
"\n",
"hardTimeout",
"=",
"false",
"\n",
"probeReturned",
"=",
"make",
"(",
"chan",
"struct",
"{",
"}",
",",
"1",
")",
"\n",
"ctx",
",",
"cancel",
"=",
"context",
".",
"WithTimeout",
"(",
"context",
".",
"Background",
"(",
")",
",",
"c",
".",
"config",
".",
"FailureThreshold",
")",
"\n",
"ctxTimeout",
"=",
"make",
"(",
"chan",
"struct",
"{",
"}",
",",
"1",
")",
"\n",
")",
"\n\n",
"c",
".",
"Lock",
"(",
")",
"\n",
"c",
".",
"probeStartTime",
"[",
"p",
".",
"Name",
"]",
"=",
"time",
".",
"Now",
"(",
")",
"\n",
"c",
".",
"Unlock",
"(",
")",
"\n\n",
"go",
"func",
"(",
")",
"{",
"statusData",
",",
"err",
"=",
"p",
".",
"Probe",
"(",
"ctx",
")",
"\n",
"close",
"(",
"probeReturned",
")",
"\n",
"}",
"(",
")",
"\n\n",
"go",
"func",
"(",
")",
"{",
"// Once ctx.Done() has been closed, we notify the polling loop by",
"// sending to the ctxTimeout channel. We cannot just close the channel,",
"// because otherwise the loop will always enter the \"<-ctxTimeout\" case.",
"<-",
"ctx",
".",
"Done",
"(",
")",
"\n",
"ctxTimeout",
"<-",
"struct",
"{",
"}",
"{",
"}",
"\n",
"}",
"(",
")",
"\n\n",
"// This is a loop so that, when we hit a FailureThreshold, we still do",
"// not return until the probe returns. This is to ensure the same probe",
"// does not run again while it is blocked.",
"for",
"{",
"select",
"{",
"case",
"<-",
"c",
".",
"stop",
":",
"// Collector was closed. The probe will complete in the background",
"// and won't be restarted again.",
"cancel",
"(",
")",
"\n",
"return",
"\n\n",
"case",
"<-",
"warningThreshold",
":",
"// Just warn and continue waiting for probe",
"log",
".",
"WithField",
"(",
"logfields",
".",
"Probe",
",",
"p",
".",
"Name",
")",
".",
"Warnf",
"(",
"\"",
"\"",
",",
"c",
".",
"config",
".",
"WarningThreshold",
".",
"Seconds",
"(",
")",
")",
"\n\n",
"case",
"<-",
"probeReturned",
":",
"// The probe completed and we can return from runProbe",
"switch",
"{",
"case",
"hardTimeout",
":",
"// FailureThreshold was already reached. Keep the failure error",
"// message",
"case",
"err",
"!=",
"nil",
":",
"c",
".",
"updateProbeStatus",
"(",
"p",
",",
"nil",
",",
"false",
",",
"err",
")",
"\n",
"default",
":",
"c",
".",
"updateProbeStatus",
"(",
"p",
",",
"statusData",
",",
"false",
",",
"nil",
")",
"\n",
"}",
"\n\n",
"cancel",
"(",
")",
"\n",
"return",
"\n\n",
"case",
"<-",
"ctxTimeout",
":",
"// We have timed out. Report a status and mark that we timed out so we",
"// do not emit status later.",
"staleErr",
":=",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"p",
".",
"Name",
",",
"c",
".",
"config",
".",
"FailureThreshold",
".",
"Seconds",
"(",
")",
")",
"\n",
"c",
".",
"updateProbeStatus",
"(",
"p",
",",
"nil",
",",
"true",
",",
"staleErr",
")",
"\n",
"hardTimeout",
"=",
"true",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // runProbe runs the given probe, and returns either after the probe has returned
// or after the collector has been closed. | [
"runProbe",
"runs",
"the",
"given",
"probe",
"and",
"returns",
"either",
"after",
"the",
"probe",
"has",
"returned",
"or",
"after",
"the",
"collector",
"has",
"been",
"closed",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/status/status.go#L165-L234 |
163,341 | cilium/cilium | api/v1/server/restapi/policy/delete_fqdn_cache.go | NewDeleteFqdnCache | func NewDeleteFqdnCache(ctx *middleware.Context, handler DeleteFqdnCacheHandler) *DeleteFqdnCache {
return &DeleteFqdnCache{Context: ctx, Handler: handler}
} | go | func NewDeleteFqdnCache(ctx *middleware.Context, handler DeleteFqdnCacheHandler) *DeleteFqdnCache {
return &DeleteFqdnCache{Context: ctx, Handler: handler}
} | [
"func",
"NewDeleteFqdnCache",
"(",
"ctx",
"*",
"middleware",
".",
"Context",
",",
"handler",
"DeleteFqdnCacheHandler",
")",
"*",
"DeleteFqdnCache",
"{",
"return",
"&",
"DeleteFqdnCache",
"{",
"Context",
":",
"ctx",
",",
"Handler",
":",
"handler",
"}",
"\n",
"}"
] | // NewDeleteFqdnCache creates a new http.Handler for the delete fqdn cache operation | [
"NewDeleteFqdnCache",
"creates",
"a",
"new",
"http",
".",
"Handler",
"for",
"the",
"delete",
"fqdn",
"cache",
"operation"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/server/restapi/policy/delete_fqdn_cache.go#L28-L30 |
163,342 | cilium/cilium | api/v1/client/policy/get_policy_resolve_parameters.go | WithTimeout | func (o *GetPolicyResolveParams) WithTimeout(timeout time.Duration) *GetPolicyResolveParams {
o.SetTimeout(timeout)
return o
} | go | func (o *GetPolicyResolveParams) WithTimeout(timeout time.Duration) *GetPolicyResolveParams {
o.SetTimeout(timeout)
return o
} | [
"func",
"(",
"o",
"*",
"GetPolicyResolveParams",
")",
"WithTimeout",
"(",
"timeout",
"time",
".",
"Duration",
")",
"*",
"GetPolicyResolveParams",
"{",
"o",
".",
"SetTimeout",
"(",
"timeout",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithTimeout adds the timeout to the get policy resolve params | [
"WithTimeout",
"adds",
"the",
"timeout",
"to",
"the",
"get",
"policy",
"resolve",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/policy/get_policy_resolve_parameters.go#L78-L81 |
163,343 | cilium/cilium | api/v1/client/policy/get_policy_resolve_parameters.go | WithContext | func (o *GetPolicyResolveParams) WithContext(ctx context.Context) *GetPolicyResolveParams {
o.SetContext(ctx)
return o
} | go | func (o *GetPolicyResolveParams) WithContext(ctx context.Context) *GetPolicyResolveParams {
o.SetContext(ctx)
return o
} | [
"func",
"(",
"o",
"*",
"GetPolicyResolveParams",
")",
"WithContext",
"(",
"ctx",
"context",
".",
"Context",
")",
"*",
"GetPolicyResolveParams",
"{",
"o",
".",
"SetContext",
"(",
"ctx",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithContext adds the context to the get policy resolve params | [
"WithContext",
"adds",
"the",
"context",
"to",
"the",
"get",
"policy",
"resolve",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/policy/get_policy_resolve_parameters.go#L89-L92 |
163,344 | cilium/cilium | api/v1/client/policy/get_policy_resolve_parameters.go | WithHTTPClient | func (o *GetPolicyResolveParams) WithHTTPClient(client *http.Client) *GetPolicyResolveParams {
o.SetHTTPClient(client)
return o
} | go | func (o *GetPolicyResolveParams) WithHTTPClient(client *http.Client) *GetPolicyResolveParams {
o.SetHTTPClient(client)
return o
} | [
"func",
"(",
"o",
"*",
"GetPolicyResolveParams",
")",
"WithHTTPClient",
"(",
"client",
"*",
"http",
".",
"Client",
")",
"*",
"GetPolicyResolveParams",
"{",
"o",
".",
"SetHTTPClient",
"(",
"client",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithHTTPClient adds the HTTPClient to the get policy resolve params | [
"WithHTTPClient",
"adds",
"the",
"HTTPClient",
"to",
"the",
"get",
"policy",
"resolve",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/policy/get_policy_resolve_parameters.go#L100-L103 |
163,345 | cilium/cilium | api/v1/client/policy/get_policy_resolve_parameters.go | WithTraceSelector | func (o *GetPolicyResolveParams) WithTraceSelector(traceSelector *models.TraceSelector) *GetPolicyResolveParams {
o.SetTraceSelector(traceSelector)
return o
} | go | func (o *GetPolicyResolveParams) WithTraceSelector(traceSelector *models.TraceSelector) *GetPolicyResolveParams {
o.SetTraceSelector(traceSelector)
return o
} | [
"func",
"(",
"o",
"*",
"GetPolicyResolveParams",
")",
"WithTraceSelector",
"(",
"traceSelector",
"*",
"models",
".",
"TraceSelector",
")",
"*",
"GetPolicyResolveParams",
"{",
"o",
".",
"SetTraceSelector",
"(",
"traceSelector",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithTraceSelector adds the traceSelector to the get policy resolve params | [
"WithTraceSelector",
"adds",
"the",
"traceSelector",
"to",
"the",
"get",
"policy",
"resolve",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/policy/get_policy_resolve_parameters.go#L111-L114 |
163,346 | cilium/cilium | pkg/identity/cache/allocator.go | InitIdentityAllocator | func InitIdentityAllocator(owner IdentityAllocatorOwner) {
setupMutex.Lock()
defer setupMutex.Unlock()
if IdentityAllocator != nil {
log.Panic("InitIdentityAllocator() in succession without calling Close()")
}
identity.InitWellKnownIdentities()
log.Info("Initializing identity allocator")
minID := idpool.ID(identity.MinimalAllocationIdentity)
maxID := idpool.ID(identity.MaximumAllocationIdentity)
events := make(allocator.AllocatorEventChan, 1024)
// It is important to start listening for events before calling
// NewAllocator() as it will emit events while filling the
// initial cache
watcher.watch(owner, events)
a, err := allocator.NewAllocator(IdentitiesPath, globalIdentity{},
allocator.WithMax(maxID), allocator.WithMin(minID),
allocator.WithSuffix(owner.GetNodeSuffix()),
allocator.WithEvents(events),
allocator.WithMasterKeyProtection(),
allocator.WithPrefixMask(idpool.ID(option.Config.ClusterID<<identity.ClusterIDShift)))
if err != nil {
log.WithError(err).Fatal("Unable to initialize identity allocator")
}
IdentityAllocator = a
close(identityAllocatorInitialized)
localIdentities = newLocalIdentityCache(1, 0xFFFFFF, events)
} | go | func InitIdentityAllocator(owner IdentityAllocatorOwner) {
setupMutex.Lock()
defer setupMutex.Unlock()
if IdentityAllocator != nil {
log.Panic("InitIdentityAllocator() in succession without calling Close()")
}
identity.InitWellKnownIdentities()
log.Info("Initializing identity allocator")
minID := idpool.ID(identity.MinimalAllocationIdentity)
maxID := idpool.ID(identity.MaximumAllocationIdentity)
events := make(allocator.AllocatorEventChan, 1024)
// It is important to start listening for events before calling
// NewAllocator() as it will emit events while filling the
// initial cache
watcher.watch(owner, events)
a, err := allocator.NewAllocator(IdentitiesPath, globalIdentity{},
allocator.WithMax(maxID), allocator.WithMin(minID),
allocator.WithSuffix(owner.GetNodeSuffix()),
allocator.WithEvents(events),
allocator.WithMasterKeyProtection(),
allocator.WithPrefixMask(idpool.ID(option.Config.ClusterID<<identity.ClusterIDShift)))
if err != nil {
log.WithError(err).Fatal("Unable to initialize identity allocator")
}
IdentityAllocator = a
close(identityAllocatorInitialized)
localIdentities = newLocalIdentityCache(1, 0xFFFFFF, events)
} | [
"func",
"InitIdentityAllocator",
"(",
"owner",
"IdentityAllocatorOwner",
")",
"{",
"setupMutex",
".",
"Lock",
"(",
")",
"\n",
"defer",
"setupMutex",
".",
"Unlock",
"(",
")",
"\n\n",
"if",
"IdentityAllocator",
"!=",
"nil",
"{",
"log",
".",
"Panic",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"identity",
".",
"InitWellKnownIdentities",
"(",
")",
"\n\n",
"log",
".",
"Info",
"(",
"\"",
"\"",
")",
"\n\n",
"minID",
":=",
"idpool",
".",
"ID",
"(",
"identity",
".",
"MinimalAllocationIdentity",
")",
"\n",
"maxID",
":=",
"idpool",
".",
"ID",
"(",
"identity",
".",
"MaximumAllocationIdentity",
")",
"\n",
"events",
":=",
"make",
"(",
"allocator",
".",
"AllocatorEventChan",
",",
"1024",
")",
"\n\n",
"// It is important to start listening for events before calling",
"// NewAllocator() as it will emit events while filling the",
"// initial cache",
"watcher",
".",
"watch",
"(",
"owner",
",",
"events",
")",
"\n\n",
"a",
",",
"err",
":=",
"allocator",
".",
"NewAllocator",
"(",
"IdentitiesPath",
",",
"globalIdentity",
"{",
"}",
",",
"allocator",
".",
"WithMax",
"(",
"maxID",
")",
",",
"allocator",
".",
"WithMin",
"(",
"minID",
")",
",",
"allocator",
".",
"WithSuffix",
"(",
"owner",
".",
"GetNodeSuffix",
"(",
")",
")",
",",
"allocator",
".",
"WithEvents",
"(",
"events",
")",
",",
"allocator",
".",
"WithMasterKeyProtection",
"(",
")",
",",
"allocator",
".",
"WithPrefixMask",
"(",
"idpool",
".",
"ID",
"(",
"option",
".",
"Config",
".",
"ClusterID",
"<<",
"identity",
".",
"ClusterIDShift",
")",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"WithError",
"(",
"err",
")",
".",
"Fatal",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"IdentityAllocator",
"=",
"a",
"\n",
"close",
"(",
"identityAllocatorInitialized",
")",
"\n",
"localIdentities",
"=",
"newLocalIdentityCache",
"(",
"1",
",",
"0xFFFFFF",
",",
"events",
")",
"\n\n",
"}"
] | // InitIdentityAllocator creates the the identity allocator. Only the first
// invocation of this function will have an effect. | [
"InitIdentityAllocator",
"creates",
"the",
"the",
"identity",
"allocator",
".",
"Only",
"the",
"first",
"invocation",
"of",
"this",
"function",
"will",
"have",
"an",
"effect",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/identity/cache/allocator.go#L90-L125 |
163,347 | cilium/cilium | pkg/identity/cache/allocator.go | WaitForInitialIdentities | func WaitForInitialIdentities(ctx context.Context) error {
select {
case <-identityAllocatorInitialized:
case <-ctx.Done():
return fmt.Errorf("initial identity sync was cancelled: %s", ctx.Err())
}
return IdentityAllocator.WaitForInitialSync(ctx)
} | go | func WaitForInitialIdentities(ctx context.Context) error {
select {
case <-identityAllocatorInitialized:
case <-ctx.Done():
return fmt.Errorf("initial identity sync was cancelled: %s", ctx.Err())
}
return IdentityAllocator.WaitForInitialSync(ctx)
} | [
"func",
"WaitForInitialIdentities",
"(",
"ctx",
"context",
".",
"Context",
")",
"error",
"{",
"select",
"{",
"case",
"<-",
"identityAllocatorInitialized",
":",
"case",
"<-",
"ctx",
".",
"Done",
"(",
")",
":",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"ctx",
".",
"Err",
"(",
")",
")",
"\n",
"}",
"\n\n",
"return",
"IdentityAllocator",
".",
"WaitForInitialSync",
"(",
"ctx",
")",
"\n",
"}"
] | // WaitForInitialIdentities waits for the initial set of security identities to
// have been received and populated into the allocator cache | [
"WaitForInitialIdentities",
"waits",
"for",
"the",
"initial",
"set",
"of",
"security",
"identities",
"to",
"have",
"been",
"received",
"and",
"populated",
"into",
"the",
"allocator",
"cache"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/identity/cache/allocator.go#L151-L159 |
163,348 | cilium/cilium | pkg/identity/cache/allocator.go | AllocateIdentity | func AllocateIdentity(ctx context.Context, lbls labels.Labels) (*identity.Identity, bool, error) {
log.WithFields(logrus.Fields{
logfields.IdentityLabels: lbls.String(),
}).Debug("Resolving identity")
// If there is only one label with the "reserved" source and a well-known
// key, use the well-known identity for that key.
if reservedIdentity := LookupReservedIdentityByLabels(lbls); reservedIdentity != nil {
log.WithFields(logrus.Fields{
logfields.Identity: reservedIdentity.ID,
logfields.IdentityLabels: lbls.String(),
"isNew": false,
}).Debug("Resolved reserved identity")
return reservedIdentity, false, nil
}
if !identity.RequiresGlobalIdentity(lbls) && localIdentities != nil {
return localIdentities.lookupOrCreate(lbls)
}
// This will block until the kvstore can be accessed and all identities
// were succesfully synced
WaitForInitialIdentities(ctx)
if IdentityAllocator == nil {
return nil, false, fmt.Errorf("allocator not initialized")
}
id, isNew, err := IdentityAllocator.Allocate(ctx, globalIdentity{lbls.LabelArray()})
if err != nil {
return nil, false, err
}
log.WithFields(logrus.Fields{
logfields.Identity: id,
logfields.IdentityLabels: lbls.String(),
"isNew": isNew,
}).Debug("Resolved identity")
return identity.NewIdentity(identity.NumericIdentity(id), lbls), isNew, nil
} | go | func AllocateIdentity(ctx context.Context, lbls labels.Labels) (*identity.Identity, bool, error) {
log.WithFields(logrus.Fields{
logfields.IdentityLabels: lbls.String(),
}).Debug("Resolving identity")
// If there is only one label with the "reserved" source and a well-known
// key, use the well-known identity for that key.
if reservedIdentity := LookupReservedIdentityByLabels(lbls); reservedIdentity != nil {
log.WithFields(logrus.Fields{
logfields.Identity: reservedIdentity.ID,
logfields.IdentityLabels: lbls.String(),
"isNew": false,
}).Debug("Resolved reserved identity")
return reservedIdentity, false, nil
}
if !identity.RequiresGlobalIdentity(lbls) && localIdentities != nil {
return localIdentities.lookupOrCreate(lbls)
}
// This will block until the kvstore can be accessed and all identities
// were succesfully synced
WaitForInitialIdentities(ctx)
if IdentityAllocator == nil {
return nil, false, fmt.Errorf("allocator not initialized")
}
id, isNew, err := IdentityAllocator.Allocate(ctx, globalIdentity{lbls.LabelArray()})
if err != nil {
return nil, false, err
}
log.WithFields(logrus.Fields{
logfields.Identity: id,
logfields.IdentityLabels: lbls.String(),
"isNew": isNew,
}).Debug("Resolved identity")
return identity.NewIdentity(identity.NumericIdentity(id), lbls), isNew, nil
} | [
"func",
"AllocateIdentity",
"(",
"ctx",
"context",
".",
"Context",
",",
"lbls",
"labels",
".",
"Labels",
")",
"(",
"*",
"identity",
".",
"Identity",
",",
"bool",
",",
"error",
")",
"{",
"log",
".",
"WithFields",
"(",
"logrus",
".",
"Fields",
"{",
"logfields",
".",
"IdentityLabels",
":",
"lbls",
".",
"String",
"(",
")",
",",
"}",
")",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n\n",
"// If there is only one label with the \"reserved\" source and a well-known",
"// key, use the well-known identity for that key.",
"if",
"reservedIdentity",
":=",
"LookupReservedIdentityByLabels",
"(",
"lbls",
")",
";",
"reservedIdentity",
"!=",
"nil",
"{",
"log",
".",
"WithFields",
"(",
"logrus",
".",
"Fields",
"{",
"logfields",
".",
"Identity",
":",
"reservedIdentity",
".",
"ID",
",",
"logfields",
".",
"IdentityLabels",
":",
"lbls",
".",
"String",
"(",
")",
",",
"\"",
"\"",
":",
"false",
",",
"}",
")",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"return",
"reservedIdentity",
",",
"false",
",",
"nil",
"\n",
"}",
"\n\n",
"if",
"!",
"identity",
".",
"RequiresGlobalIdentity",
"(",
"lbls",
")",
"&&",
"localIdentities",
"!=",
"nil",
"{",
"return",
"localIdentities",
".",
"lookupOrCreate",
"(",
"lbls",
")",
"\n",
"}",
"\n\n",
"// This will block until the kvstore can be accessed and all identities",
"// were succesfully synced",
"WaitForInitialIdentities",
"(",
"ctx",
")",
"\n\n",
"if",
"IdentityAllocator",
"==",
"nil",
"{",
"return",
"nil",
",",
"false",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"id",
",",
"isNew",
",",
"err",
":=",
"IdentityAllocator",
".",
"Allocate",
"(",
"ctx",
",",
"globalIdentity",
"{",
"lbls",
".",
"LabelArray",
"(",
")",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"false",
",",
"err",
"\n",
"}",
"\n\n",
"log",
".",
"WithFields",
"(",
"logrus",
".",
"Fields",
"{",
"logfields",
".",
"Identity",
":",
"id",
",",
"logfields",
".",
"IdentityLabels",
":",
"lbls",
".",
"String",
"(",
")",
",",
"\"",
"\"",
":",
"isNew",
",",
"}",
")",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n\n",
"return",
"identity",
".",
"NewIdentity",
"(",
"identity",
".",
"NumericIdentity",
"(",
"id",
")",
",",
"lbls",
")",
",",
"isNew",
",",
"nil",
"\n",
"}"
] | // AllocateIdentity allocates an identity described by the specified labels. If
// an identity for the specified set of labels already exist, the identity is
// re-used and reference counting is performed, otherwise a new identity is
// allocated via the kvstore. | [
"AllocateIdentity",
"allocates",
"an",
"identity",
"described",
"by",
"the",
"specified",
"labels",
".",
"If",
"an",
"identity",
"for",
"the",
"specified",
"set",
"of",
"labels",
"already",
"exist",
"the",
"identity",
"is",
"re",
"-",
"used",
"and",
"reference",
"counting",
"is",
"performed",
"otherwise",
"a",
"new",
"identity",
"is",
"allocated",
"via",
"the",
"kvstore",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/identity/cache/allocator.go#L177-L217 |
163,349 | cilium/cilium | pkg/identity/cache/allocator.go | ReleaseSlice | func ReleaseSlice(ctx context.Context, identities []*identity.Identity) error {
var err error
for _, id := range identities {
if id == nil {
continue
}
if _, err2 := Release(ctx, id); err2 != nil {
log.WithError(err2).WithFields(logrus.Fields{
logfields.Identity: id,
}).Error("Failed to release identity")
err = err2
}
}
return err
} | go | func ReleaseSlice(ctx context.Context, identities []*identity.Identity) error {
var err error
for _, id := range identities {
if id == nil {
continue
}
if _, err2 := Release(ctx, id); err2 != nil {
log.WithError(err2).WithFields(logrus.Fields{
logfields.Identity: id,
}).Error("Failed to release identity")
err = err2
}
}
return err
} | [
"func",
"ReleaseSlice",
"(",
"ctx",
"context",
".",
"Context",
",",
"identities",
"[",
"]",
"*",
"identity",
".",
"Identity",
")",
"error",
"{",
"var",
"err",
"error",
"\n",
"for",
"_",
",",
"id",
":=",
"range",
"identities",
"{",
"if",
"id",
"==",
"nil",
"{",
"continue",
"\n",
"}",
"\n",
"if",
"_",
",",
"err2",
":=",
"Release",
"(",
"ctx",
",",
"id",
")",
";",
"err2",
"!=",
"nil",
"{",
"log",
".",
"WithError",
"(",
"err2",
")",
".",
"WithFields",
"(",
"logrus",
".",
"Fields",
"{",
"logfields",
".",
"Identity",
":",
"id",
",",
"}",
")",
".",
"Error",
"(",
"\"",
"\"",
")",
"\n",
"err",
"=",
"err2",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"err",
"\n",
"}"
] | // ReleaseSlice attempts to release a set of identities. It is a helper
// function that may be useful for cleaning up multiple identities in paths
// where several identities may be allocated and another error means that they
// should all be released. | [
"ReleaseSlice",
"attempts",
"to",
"release",
"a",
"set",
"of",
"identities",
".",
"It",
"is",
"a",
"helper",
"function",
"that",
"may",
"be",
"useful",
"for",
"cleaning",
"up",
"multiple",
"identities",
"in",
"paths",
"where",
"several",
"identities",
"may",
"be",
"allocated",
"and",
"another",
"error",
"means",
"that",
"they",
"should",
"all",
"be",
"released",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/identity/cache/allocator.go#L248-L262 |
163,350 | cilium/cilium | pkg/identity/cache/allocator.go | WatchRemoteIdentities | func WatchRemoteIdentities(backend kvstore.BackendOperations) *allocator.RemoteCache {
<-identityAllocatorInitialized
return IdentityAllocator.WatchRemoteKVStore(backend, IdentitiesPath)
} | go | func WatchRemoteIdentities(backend kvstore.BackendOperations) *allocator.RemoteCache {
<-identityAllocatorInitialized
return IdentityAllocator.WatchRemoteKVStore(backend, IdentitiesPath)
} | [
"func",
"WatchRemoteIdentities",
"(",
"backend",
"kvstore",
".",
"BackendOperations",
")",
"*",
"allocator",
".",
"RemoteCache",
"{",
"<-",
"identityAllocatorInitialized",
"\n",
"return",
"IdentityAllocator",
".",
"WatchRemoteKVStore",
"(",
"backend",
",",
"IdentitiesPath",
")",
"\n",
"}"
] | // WatchRemoteIdentities starts watching for identities in another kvstore and
// syncs all identities to the local identity cache. | [
"WatchRemoteIdentities",
"starts",
"watching",
"for",
"identities",
"in",
"another",
"kvstore",
"and",
"syncs",
"all",
"identities",
"to",
"the",
"local",
"identity",
"cache",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/identity/cache/allocator.go#L266-L269 |
163,351 | cilium/cilium | pkg/maps/lbmap/lbmap.go | DeleteService | func DeleteService(key ServiceKey) error {
mutex.Lock()
defer mutex.Unlock()
err := deleteServiceLocked(key)
if err != nil {
return err
}
return nil
} | go | func DeleteService(key ServiceKey) error {
mutex.Lock()
defer mutex.Unlock()
err := deleteServiceLocked(key)
if err != nil {
return err
}
return nil
} | [
"func",
"DeleteService",
"(",
"key",
"ServiceKey",
")",
"error",
"{",
"mutex",
".",
"Lock",
"(",
")",
"\n",
"defer",
"mutex",
".",
"Unlock",
"(",
")",
"\n\n",
"err",
":=",
"deleteServiceLocked",
"(",
"key",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // DeleteService deletes a legacy service from the lbmap. The given key has to
// be of the master service. | [
"DeleteService",
"deletes",
"a",
"legacy",
"service",
"from",
"the",
"lbmap",
".",
"The",
"given",
"key",
"has",
"to",
"be",
"of",
"the",
"master",
"service",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/lbmap/lbmap.go#L70-L80 |
163,352 | cilium/cilium | pkg/maps/lbmap/lbmap.go | updateServiceWeights | func updateServiceWeights(key ServiceKey, value *RRSeqValue) error {
if _, err := key.RRMap().OpenOrCreate(); err != nil {
return err
}
return key.RRMap().Update(key.ToNetwork(), value)
} | go | func updateServiceWeights(key ServiceKey, value *RRSeqValue) error {
if _, err := key.RRMap().OpenOrCreate(); err != nil {
return err
}
return key.RRMap().Update(key.ToNetwork(), value)
} | [
"func",
"updateServiceWeights",
"(",
"key",
"ServiceKey",
",",
"value",
"*",
"RRSeqValue",
")",
"error",
"{",
"if",
"_",
",",
"err",
":=",
"key",
".",
"RRMap",
"(",
")",
".",
"OpenOrCreate",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"return",
"key",
".",
"RRMap",
"(",
")",
".",
"Update",
"(",
"key",
".",
"ToNetwork",
"(",
")",
",",
"value",
")",
"\n",
"}"
] | // updateServiceWeights updates cilium_lb6_rr_seq or cilium_lb4_rr_seq bpf maps. | [
"updateServiceWeights",
"updates",
"cilium_lb6_rr_seq",
"or",
"cilium_lb4_rr_seq",
"bpf",
"maps",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/lbmap/lbmap.go#L108-L114 |
163,353 | cilium/cilium | pkg/maps/lbmap/lbmap.go | lookupAndDeleteServiceWeights | func lookupAndDeleteServiceWeights(key ServiceKey) error {
_, err := key.RRMap().Lookup(key.ToNetwork())
if err != nil {
// Ignore if entry is not found.
return nil
}
return key.RRMap().Delete(key.ToNetwork())
} | go | func lookupAndDeleteServiceWeights(key ServiceKey) error {
_, err := key.RRMap().Lookup(key.ToNetwork())
if err != nil {
// Ignore if entry is not found.
return nil
}
return key.RRMap().Delete(key.ToNetwork())
} | [
"func",
"lookupAndDeleteServiceWeights",
"(",
"key",
"ServiceKey",
")",
"error",
"{",
"_",
",",
"err",
":=",
"key",
".",
"RRMap",
"(",
")",
".",
"Lookup",
"(",
"key",
".",
"ToNetwork",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"// Ignore if entry is not found.",
"return",
"nil",
"\n",
"}",
"\n\n",
"return",
"key",
".",
"RRMap",
"(",
")",
".",
"Delete",
"(",
"key",
".",
"ToNetwork",
"(",
")",
")",
"\n",
"}"
] | // lookupAndDeleteServiceWeights deletes entry from cilium_lb6_rr_seq or cilium_lb4_rr_seq | [
"lookupAndDeleteServiceWeights",
"deletes",
"entry",
"from",
"cilium_lb6_rr_seq",
"or",
"cilium_lb4_rr_seq"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/lbmap/lbmap.go#L117-L125 |
163,354 | cilium/cilium | pkg/maps/lbmap/lbmap.go | gcd | func gcd(x, y uint16) uint16 {
for y != 0 {
x, y = y, x%y
}
return x
} | go | func gcd(x, y uint16) uint16 {
for y != 0 {
x, y = y, x%y
}
return x
} | [
"func",
"gcd",
"(",
"x",
",",
"y",
"uint16",
")",
"uint16",
"{",
"for",
"y",
"!=",
"0",
"{",
"x",
",",
"y",
"=",
"y",
",",
"x",
"%",
"y",
"\n",
"}",
"\n",
"return",
"x",
"\n",
"}"
] | // gcd computes the gcd of two numbers. | [
"gcd",
"computes",
"the",
"gcd",
"of",
"two",
"numbers",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/lbmap/lbmap.go#L164-L169 |
163,355 | cilium/cilium | pkg/maps/lbmap/lbmap.go | generateWrrSeq | func generateWrrSeq(weights []uint16) (*RRSeqValue, error) {
svcRRSeq := RRSeqValue{}
n := len(weights)
if n < 2 {
return nil, fmt.Errorf("needs at least 2 weights")
}
g := uint16(0)
for i := 0; i < n; i++ {
if weights[i] != 0 {
g = gcd(g, weights[i])
}
}
// This means all the weights are 0.
if g == 0 {
return nil, fmt.Errorf("all specified weights are 0")
}
sum := uint16(0)
for i := range weights {
// Normalize the weights.
weights[i] = weights[i] / g
sum += weights[i]
}
// Check if Generated seq fits in our array.
if int(sum) > len(svcRRSeq.Idx) {
return nil, fmt.Errorf("sum of normalized weights exceeds %d", len(svcRRSeq.Idx))
}
// Generate the Sequence.
i := uint16(0)
k := uint16(0)
for {
j := uint16(0)
for j < weights[k] {
svcRRSeq.Idx[i] = k
i++
j++
}
if i >= sum {
break
}
k++
}
svcRRSeq.Count = sum
return &svcRRSeq, nil
} | go | func generateWrrSeq(weights []uint16) (*RRSeqValue, error) {
svcRRSeq := RRSeqValue{}
n := len(weights)
if n < 2 {
return nil, fmt.Errorf("needs at least 2 weights")
}
g := uint16(0)
for i := 0; i < n; i++ {
if weights[i] != 0 {
g = gcd(g, weights[i])
}
}
// This means all the weights are 0.
if g == 0 {
return nil, fmt.Errorf("all specified weights are 0")
}
sum := uint16(0)
for i := range weights {
// Normalize the weights.
weights[i] = weights[i] / g
sum += weights[i]
}
// Check if Generated seq fits in our array.
if int(sum) > len(svcRRSeq.Idx) {
return nil, fmt.Errorf("sum of normalized weights exceeds %d", len(svcRRSeq.Idx))
}
// Generate the Sequence.
i := uint16(0)
k := uint16(0)
for {
j := uint16(0)
for j < weights[k] {
svcRRSeq.Idx[i] = k
i++
j++
}
if i >= sum {
break
}
k++
}
svcRRSeq.Count = sum
return &svcRRSeq, nil
} | [
"func",
"generateWrrSeq",
"(",
"weights",
"[",
"]",
"uint16",
")",
"(",
"*",
"RRSeqValue",
",",
"error",
")",
"{",
"svcRRSeq",
":=",
"RRSeqValue",
"{",
"}",
"\n\n",
"n",
":=",
"len",
"(",
"weights",
")",
"\n",
"if",
"n",
"<",
"2",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"g",
":=",
"uint16",
"(",
"0",
")",
"\n",
"for",
"i",
":=",
"0",
";",
"i",
"<",
"n",
";",
"i",
"++",
"{",
"if",
"weights",
"[",
"i",
"]",
"!=",
"0",
"{",
"g",
"=",
"gcd",
"(",
"g",
",",
"weights",
"[",
"i",
"]",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"// This means all the weights are 0.",
"if",
"g",
"==",
"0",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"sum",
":=",
"uint16",
"(",
"0",
")",
"\n",
"for",
"i",
":=",
"range",
"weights",
"{",
"// Normalize the weights.",
"weights",
"[",
"i",
"]",
"=",
"weights",
"[",
"i",
"]",
"/",
"g",
"\n",
"sum",
"+=",
"weights",
"[",
"i",
"]",
"\n",
"}",
"\n\n",
"// Check if Generated seq fits in our array.",
"if",
"int",
"(",
"sum",
")",
">",
"len",
"(",
"svcRRSeq",
".",
"Idx",
")",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"len",
"(",
"svcRRSeq",
".",
"Idx",
")",
")",
"\n",
"}",
"\n\n",
"// Generate the Sequence.",
"i",
":=",
"uint16",
"(",
"0",
")",
"\n",
"k",
":=",
"uint16",
"(",
"0",
")",
"\n",
"for",
"{",
"j",
":=",
"uint16",
"(",
"0",
")",
"\n",
"for",
"j",
"<",
"weights",
"[",
"k",
"]",
"{",
"svcRRSeq",
".",
"Idx",
"[",
"i",
"]",
"=",
"k",
"\n",
"i",
"++",
"\n",
"j",
"++",
"\n",
"}",
"\n",
"if",
"i",
">=",
"sum",
"{",
"break",
"\n",
"}",
"\n",
"k",
"++",
"\n",
"}",
"\n",
"svcRRSeq",
".",
"Count",
"=",
"sum",
"\n",
"return",
"&",
"svcRRSeq",
",",
"nil",
"\n",
"}"
] | // generateWrrSeq generates a wrr sequence based on provided weights. | [
"generateWrrSeq",
"generates",
"a",
"wrr",
"sequence",
"based",
"on",
"provided",
"weights",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/lbmap/lbmap.go#L172-L221 |
163,356 | cilium/cilium | pkg/maps/lbmap/lbmap.go | DumpBackendMapsToUserspace | func DumpBackendMapsToUserspace() (map[BackendAddrID]*loadbalancer.LBBackEnd, error) {
backendValueMap := map[loadbalancer.BackendID]BackendValue{}
lbBackends := map[BackendAddrID]*loadbalancer.LBBackEnd{}
parseBackendEntries := func(key bpf.MapKey, value bpf.MapValue) {
backendKey := key.(BackendKey)
backendValue := value.(BackendValue)
backendValueMap[backendKey.GetID()] = backendValue
}
if option.Config.EnableIPv4 {
err := Backend4Map.DumpWithCallback(parseBackendEntries)
if err != nil {
return nil, fmt.Errorf("Unable to dump lb4 backends map: %s", err)
}
}
if option.Config.EnableIPv6 {
err := Backend6Map.DumpWithCallback(parseBackendEntries)
if err != nil {
return nil, fmt.Errorf("Unable to dump lb6 backends map: %s", err)
}
}
for backendID, backendVal := range backendValueMap {
ip := backendVal.GetAddress()
port := backendVal.GetPort()
weight := uint16(0) // FIXME(brb): set weight when we support it
proto := loadbalancer.NONE
lbBackend := loadbalancer.NewLBBackEnd(backendID, proto, ip, port, weight)
lbBackends[backendVal.BackendAddrID()] = lbBackend
}
return lbBackends, nil
} | go | func DumpBackendMapsToUserspace() (map[BackendAddrID]*loadbalancer.LBBackEnd, error) {
backendValueMap := map[loadbalancer.BackendID]BackendValue{}
lbBackends := map[BackendAddrID]*loadbalancer.LBBackEnd{}
parseBackendEntries := func(key bpf.MapKey, value bpf.MapValue) {
backendKey := key.(BackendKey)
backendValue := value.(BackendValue)
backendValueMap[backendKey.GetID()] = backendValue
}
if option.Config.EnableIPv4 {
err := Backend4Map.DumpWithCallback(parseBackendEntries)
if err != nil {
return nil, fmt.Errorf("Unable to dump lb4 backends map: %s", err)
}
}
if option.Config.EnableIPv6 {
err := Backend6Map.DumpWithCallback(parseBackendEntries)
if err != nil {
return nil, fmt.Errorf("Unable to dump lb6 backends map: %s", err)
}
}
for backendID, backendVal := range backendValueMap {
ip := backendVal.GetAddress()
port := backendVal.GetPort()
weight := uint16(0) // FIXME(brb): set weight when we support it
proto := loadbalancer.NONE
lbBackend := loadbalancer.NewLBBackEnd(backendID, proto, ip, port, weight)
lbBackends[backendVal.BackendAddrID()] = lbBackend
}
return lbBackends, nil
} | [
"func",
"DumpBackendMapsToUserspace",
"(",
")",
"(",
"map",
"[",
"BackendAddrID",
"]",
"*",
"loadbalancer",
".",
"LBBackEnd",
",",
"error",
")",
"{",
"backendValueMap",
":=",
"map",
"[",
"loadbalancer",
".",
"BackendID",
"]",
"BackendValue",
"{",
"}",
"\n",
"lbBackends",
":=",
"map",
"[",
"BackendAddrID",
"]",
"*",
"loadbalancer",
".",
"LBBackEnd",
"{",
"}",
"\n\n",
"parseBackendEntries",
":=",
"func",
"(",
"key",
"bpf",
".",
"MapKey",
",",
"value",
"bpf",
".",
"MapValue",
")",
"{",
"backendKey",
":=",
"key",
".",
"(",
"BackendKey",
")",
"\n",
"backendValue",
":=",
"value",
".",
"(",
"BackendValue",
")",
"\n",
"backendValueMap",
"[",
"backendKey",
".",
"GetID",
"(",
")",
"]",
"=",
"backendValue",
"\n",
"}",
"\n\n",
"if",
"option",
".",
"Config",
".",
"EnableIPv4",
"{",
"err",
":=",
"Backend4Map",
".",
"DumpWithCallback",
"(",
"parseBackendEntries",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"option",
".",
"Config",
".",
"EnableIPv6",
"{",
"err",
":=",
"Backend6Map",
".",
"DumpWithCallback",
"(",
"parseBackendEntries",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"for",
"backendID",
",",
"backendVal",
":=",
"range",
"backendValueMap",
"{",
"ip",
":=",
"backendVal",
".",
"GetAddress",
"(",
")",
"\n",
"port",
":=",
"backendVal",
".",
"GetPort",
"(",
")",
"\n",
"weight",
":=",
"uint16",
"(",
"0",
")",
"// FIXME(brb): set weight when we support it",
"\n",
"proto",
":=",
"loadbalancer",
".",
"NONE",
"\n",
"lbBackend",
":=",
"loadbalancer",
".",
"NewLBBackEnd",
"(",
"backendID",
",",
"proto",
",",
"ip",
",",
"port",
",",
"weight",
")",
"\n",
"lbBackends",
"[",
"backendVal",
".",
"BackendAddrID",
"(",
")",
"]",
"=",
"lbBackend",
"\n",
"}",
"\n\n",
"return",
"lbBackends",
",",
"nil",
"\n",
"}"
] | // DumpBackendMapsToUserspace dumps the backend entries from the BPF maps. | [
"DumpBackendMapsToUserspace",
"dumps",
"the",
"backend",
"entries",
"from",
"the",
"BPF",
"maps",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/lbmap/lbmap.go#L719-L753 |
163,357 | cilium/cilium | pkg/maps/lbmap/lbmap.go | DumpRevNATMapsToUserspace | func DumpRevNATMapsToUserspace() (loadbalancer.RevNATMap, []error) {
newRevNATMap := loadbalancer.RevNATMap{}
errors := []error{}
parseRevNATEntries := func(key bpf.MapKey, value bpf.MapValue) {
revNatK := key.(RevNatKey)
revNatV := value.(RevNatValue)
scopedLog := log.WithFields(logrus.Fields{
logfields.BPFMapKey: revNatK,
logfields.BPFMapValue: revNatV,
})
scopedLog.Debug("parsing BPF revNAT mapping")
fe := revNatValue2L3n4AddrID(revNatK, revNatV)
newRevNATMap[loadbalancer.ServiceID(fe.ID)] = fe.L3n4Addr
}
mutex.RLock()
defer mutex.RUnlock()
if option.Config.EnableIPv4 {
if err := RevNat4Map.DumpWithCallback(parseRevNATEntries); err != nil {
err = fmt.Errorf("error dumping RevNat4Map: %s", err)
errors = append(errors, err)
}
}
if option.Config.EnableIPv6 {
if err := RevNat6Map.DumpWithCallback(parseRevNATEntries); err != nil {
err = fmt.Errorf("error dumping RevNat6Map: %s", err)
errors = append(errors, err)
}
}
return newRevNATMap, errors
} | go | func DumpRevNATMapsToUserspace() (loadbalancer.RevNATMap, []error) {
newRevNATMap := loadbalancer.RevNATMap{}
errors := []error{}
parseRevNATEntries := func(key bpf.MapKey, value bpf.MapValue) {
revNatK := key.(RevNatKey)
revNatV := value.(RevNatValue)
scopedLog := log.WithFields(logrus.Fields{
logfields.BPFMapKey: revNatK,
logfields.BPFMapValue: revNatV,
})
scopedLog.Debug("parsing BPF revNAT mapping")
fe := revNatValue2L3n4AddrID(revNatK, revNatV)
newRevNATMap[loadbalancer.ServiceID(fe.ID)] = fe.L3n4Addr
}
mutex.RLock()
defer mutex.RUnlock()
if option.Config.EnableIPv4 {
if err := RevNat4Map.DumpWithCallback(parseRevNATEntries); err != nil {
err = fmt.Errorf("error dumping RevNat4Map: %s", err)
errors = append(errors, err)
}
}
if option.Config.EnableIPv6 {
if err := RevNat6Map.DumpWithCallback(parseRevNATEntries); err != nil {
err = fmt.Errorf("error dumping RevNat6Map: %s", err)
errors = append(errors, err)
}
}
return newRevNATMap, errors
} | [
"func",
"DumpRevNATMapsToUserspace",
"(",
")",
"(",
"loadbalancer",
".",
"RevNATMap",
",",
"[",
"]",
"error",
")",
"{",
"newRevNATMap",
":=",
"loadbalancer",
".",
"RevNATMap",
"{",
"}",
"\n",
"errors",
":=",
"[",
"]",
"error",
"{",
"}",
"\n\n",
"parseRevNATEntries",
":=",
"func",
"(",
"key",
"bpf",
".",
"MapKey",
",",
"value",
"bpf",
".",
"MapValue",
")",
"{",
"revNatK",
":=",
"key",
".",
"(",
"RevNatKey",
")",
"\n",
"revNatV",
":=",
"value",
".",
"(",
"RevNatValue",
")",
"\n",
"scopedLog",
":=",
"log",
".",
"WithFields",
"(",
"logrus",
".",
"Fields",
"{",
"logfields",
".",
"BPFMapKey",
":",
"revNatK",
",",
"logfields",
".",
"BPFMapValue",
":",
"revNatV",
",",
"}",
")",
"\n\n",
"scopedLog",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"fe",
":=",
"revNatValue2L3n4AddrID",
"(",
"revNatK",
",",
"revNatV",
")",
"\n",
"newRevNATMap",
"[",
"loadbalancer",
".",
"ServiceID",
"(",
"fe",
".",
"ID",
")",
"]",
"=",
"fe",
".",
"L3n4Addr",
"\n",
"}",
"\n\n",
"mutex",
".",
"RLock",
"(",
")",
"\n",
"defer",
"mutex",
".",
"RUnlock",
"(",
")",
"\n\n",
"if",
"option",
".",
"Config",
".",
"EnableIPv4",
"{",
"if",
"err",
":=",
"RevNat4Map",
".",
"DumpWithCallback",
"(",
"parseRevNATEntries",
")",
";",
"err",
"!=",
"nil",
"{",
"err",
"=",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"errors",
"=",
"append",
"(",
"errors",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"option",
".",
"Config",
".",
"EnableIPv6",
"{",
"if",
"err",
":=",
"RevNat6Map",
".",
"DumpWithCallback",
"(",
"parseRevNATEntries",
")",
";",
"err",
"!=",
"nil",
"{",
"err",
"=",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"errors",
"=",
"append",
"(",
"errors",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"newRevNATMap",
",",
"errors",
"\n",
"}"
] | // DumpRevNATMapsToUserspace dumps the contents of both the IPv6 and IPv4
// revNAT BPF maps, and stores the contents of said dumps in a RevNATMap.
// Returns the errors that occurred while dumping the maps. | [
"DumpRevNATMapsToUserspace",
"dumps",
"the",
"contents",
"of",
"both",
"the",
"IPv6",
"and",
"IPv4",
"revNAT",
"BPF",
"maps",
"and",
"stores",
"the",
"contents",
"of",
"said",
"dumps",
"in",
"a",
"RevNATMap",
".",
"Returns",
"the",
"errors",
"that",
"occurred",
"while",
"dumping",
"the",
"maps",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/lbmap/lbmap.go#L758-L794 |
163,358 | cilium/cilium | pkg/maps/lbmap/lbmap.go | RestoreService | func RestoreService(svc loadbalancer.LBSVC, v2Exists bool) error {
return cache.restoreService(svc, v2Exists)
} | go | func RestoreService(svc loadbalancer.LBSVC, v2Exists bool) error {
return cache.restoreService(svc, v2Exists)
} | [
"func",
"RestoreService",
"(",
"svc",
"loadbalancer",
".",
"LBSVC",
",",
"v2Exists",
"bool",
")",
"error",
"{",
"return",
"cache",
".",
"restoreService",
"(",
"svc",
",",
"v2Exists",
")",
"\n",
"}"
] | // RestoreService restores a single service in the cache. This is required to
// guarantee consistent backend ordering, slave slot and backend by backend
// address ID lookups. | [
"RestoreService",
"restores",
"a",
"single",
"service",
"in",
"the",
"cache",
".",
"This",
"is",
"required",
"to",
"guarantee",
"consistent",
"backend",
"ordering",
"slave",
"slot",
"and",
"backend",
"by",
"backend",
"address",
"ID",
"lookups",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/lbmap/lbmap.go#L799-L801 |
163,359 | cilium/cilium | pkg/maps/lbmap/lbmap.go | updateServiceWeightsV2 | func updateServiceWeightsV2(key ServiceKeyV2, value *RRSeqValue) error {
if _, err := key.RRMap().OpenOrCreate(); err != nil {
return err
}
return key.RRMap().Update(key.ToNetwork(), value)
} | go | func updateServiceWeightsV2(key ServiceKeyV2, value *RRSeqValue) error {
if _, err := key.RRMap().OpenOrCreate(); err != nil {
return err
}
return key.RRMap().Update(key.ToNetwork(), value)
} | [
"func",
"updateServiceWeightsV2",
"(",
"key",
"ServiceKeyV2",
",",
"value",
"*",
"RRSeqValue",
")",
"error",
"{",
"if",
"_",
",",
"err",
":=",
"key",
".",
"RRMap",
"(",
")",
".",
"OpenOrCreate",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"return",
"key",
".",
"RRMap",
"(",
")",
".",
"Update",
"(",
"key",
".",
"ToNetwork",
"(",
")",
",",
"value",
")",
"\n",
"}"
] | // updateServiceWeightsV2 updates cilium_lb6_rr_seq_v2 or cilium_lb4_rr_seq_v2 bpf maps. | [
"updateServiceWeightsV2",
"updates",
"cilium_lb6_rr_seq_v2",
"or",
"cilium_lb4_rr_seq_v2",
"bpf",
"maps",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/lbmap/lbmap.go#L840-L846 |
163,360 | cilium/cilium | pkg/maps/lbmap/lbmap.go | lookupAndDeleteServiceWeightsV2 | func lookupAndDeleteServiceWeightsV2(key ServiceKeyV2) error {
_, err := key.RRMap().Lookup(key.ToNetwork())
if err != nil {
// Ignore if entry is not found.
return nil
}
return key.RRMap().Delete(key.ToNetwork())
} | go | func lookupAndDeleteServiceWeightsV2(key ServiceKeyV2) error {
_, err := key.RRMap().Lookup(key.ToNetwork())
if err != nil {
// Ignore if entry is not found.
return nil
}
return key.RRMap().Delete(key.ToNetwork())
} | [
"func",
"lookupAndDeleteServiceWeightsV2",
"(",
"key",
"ServiceKeyV2",
")",
"error",
"{",
"_",
",",
"err",
":=",
"key",
".",
"RRMap",
"(",
")",
".",
"Lookup",
"(",
"key",
".",
"ToNetwork",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"// Ignore if entry is not found.",
"return",
"nil",
"\n",
"}",
"\n\n",
"return",
"key",
".",
"RRMap",
"(",
")",
".",
"Delete",
"(",
"key",
".",
"ToNetwork",
"(",
")",
")",
"\n",
"}"
] | // lookupAndDeleteServiceWeightsV2 deletes entry from cilium_lb6_rr_seq or cilium_lb4_rr_seq | [
"lookupAndDeleteServiceWeightsV2",
"deletes",
"entry",
"from",
"cilium_lb6_rr_seq",
"or",
"cilium_lb4_rr_seq"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/lbmap/lbmap.go#L857-L865 |
163,361 | cilium/cilium | pkg/maps/lbmap/lbmap.go | DeleteServiceV2 | func DeleteServiceV2(svc loadbalancer.L3n4AddrID, releaseBackendID func(loadbalancer.BackendID)) error {
var (
backendKey BackendKey
svcKey ServiceKeyV2
)
mutex.Lock()
defer mutex.Unlock()
isIPv6 := svc.IsIPv6()
log.WithField(logfields.ServiceName, svc).Debug("Deleting service")
if isIPv6 {
svcKey = NewService6KeyV2(svc.IP, svc.Port, u8proto.All, 0)
} else {
svcKey = NewService4KeyV2(svc.IP, svc.Port, u8proto.All, 0)
}
backendsToRemove, backendsCount, err := cache.removeServiceV2(svcKey)
if err != nil {
return err
}
for slot := 0; slot <= backendsCount; slot++ {
svcKey.SetSlave(slot)
if err := svcKey.MapDelete(); err != nil {
return err
}
}
if isIPv6 {
backendKey = NewBackend6Key(0)
} else {
backendKey = NewBackend4Key(0)
}
for _, id := range backendsToRemove {
backendKey.SetID(id)
if err := deleteBackendLocked(backendKey); err != nil {
return fmt.Errorf("Unable to delete backend with ID %d: %s", id, err)
}
releaseBackendID(id)
log.WithField(logfields.BackendID, id).Debug("Deleted backend")
}
return nil
} | go | func DeleteServiceV2(svc loadbalancer.L3n4AddrID, releaseBackendID func(loadbalancer.BackendID)) error {
var (
backendKey BackendKey
svcKey ServiceKeyV2
)
mutex.Lock()
defer mutex.Unlock()
isIPv6 := svc.IsIPv6()
log.WithField(logfields.ServiceName, svc).Debug("Deleting service")
if isIPv6 {
svcKey = NewService6KeyV2(svc.IP, svc.Port, u8proto.All, 0)
} else {
svcKey = NewService4KeyV2(svc.IP, svc.Port, u8proto.All, 0)
}
backendsToRemove, backendsCount, err := cache.removeServiceV2(svcKey)
if err != nil {
return err
}
for slot := 0; slot <= backendsCount; slot++ {
svcKey.SetSlave(slot)
if err := svcKey.MapDelete(); err != nil {
return err
}
}
if isIPv6 {
backendKey = NewBackend6Key(0)
} else {
backendKey = NewBackend4Key(0)
}
for _, id := range backendsToRemove {
backendKey.SetID(id)
if err := deleteBackendLocked(backendKey); err != nil {
return fmt.Errorf("Unable to delete backend with ID %d: %s", id, err)
}
releaseBackendID(id)
log.WithField(logfields.BackendID, id).Debug("Deleted backend")
}
return nil
} | [
"func",
"DeleteServiceV2",
"(",
"svc",
"loadbalancer",
".",
"L3n4AddrID",
",",
"releaseBackendID",
"func",
"(",
"loadbalancer",
".",
"BackendID",
")",
")",
"error",
"{",
"var",
"(",
"backendKey",
"BackendKey",
"\n",
"svcKey",
"ServiceKeyV2",
"\n",
")",
"\n\n",
"mutex",
".",
"Lock",
"(",
")",
"\n",
"defer",
"mutex",
".",
"Unlock",
"(",
")",
"\n\n",
"isIPv6",
":=",
"svc",
".",
"IsIPv6",
"(",
")",
"\n\n",
"log",
".",
"WithField",
"(",
"logfields",
".",
"ServiceName",
",",
"svc",
")",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n\n",
"if",
"isIPv6",
"{",
"svcKey",
"=",
"NewService6KeyV2",
"(",
"svc",
".",
"IP",
",",
"svc",
".",
"Port",
",",
"u8proto",
".",
"All",
",",
"0",
")",
"\n",
"}",
"else",
"{",
"svcKey",
"=",
"NewService4KeyV2",
"(",
"svc",
".",
"IP",
",",
"svc",
".",
"Port",
",",
"u8proto",
".",
"All",
",",
"0",
")",
"\n",
"}",
"\n\n",
"backendsToRemove",
",",
"backendsCount",
",",
"err",
":=",
"cache",
".",
"removeServiceV2",
"(",
"svcKey",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"for",
"slot",
":=",
"0",
";",
"slot",
"<=",
"backendsCount",
";",
"slot",
"++",
"{",
"svcKey",
".",
"SetSlave",
"(",
"slot",
")",
"\n",
"if",
"err",
":=",
"svcKey",
".",
"MapDelete",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"isIPv6",
"{",
"backendKey",
"=",
"NewBackend6Key",
"(",
"0",
")",
"\n",
"}",
"else",
"{",
"backendKey",
"=",
"NewBackend4Key",
"(",
"0",
")",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"id",
":=",
"range",
"backendsToRemove",
"{",
"backendKey",
".",
"SetID",
"(",
"id",
")",
"\n",
"if",
"err",
":=",
"deleteBackendLocked",
"(",
"backendKey",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"id",
",",
"err",
")",
"\n",
"}",
"\n",
"releaseBackendID",
"(",
"id",
")",
"\n",
"log",
".",
"WithField",
"(",
"logfields",
".",
"BackendID",
",",
"id",
")",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // DeleteServiceV2 deletes a service from the lbmap and deletes backends of it if
// they are not used by any other service.
//
//The given key has to be of the master service. | [
"DeleteServiceV2",
"deletes",
"a",
"service",
"from",
"the",
"lbmap",
"and",
"deletes",
"backends",
"of",
"it",
"if",
"they",
"are",
"not",
"used",
"by",
"any",
"other",
"service",
".",
"The",
"given",
"key",
"has",
"to",
"be",
"of",
"the",
"master",
"service",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/lbmap/lbmap.go#L904-L951 |
163,362 | cilium/cilium | pkg/maps/lbmap/lbmap.go | DeleteServiceCache | func DeleteServiceCache(svc loadbalancer.L3n4AddrID) {
var svcKey ServiceKey
if !svc.IsIPv6() {
svcKey = NewService4Key(svc.IP, svc.Port, 0)
} else {
svcKey = NewService6Key(svc.IP, svc.Port, 0)
}
cache.delete(svcKey)
} | go | func DeleteServiceCache(svc loadbalancer.L3n4AddrID) {
var svcKey ServiceKey
if !svc.IsIPv6() {
svcKey = NewService4Key(svc.IP, svc.Port, 0)
} else {
svcKey = NewService6Key(svc.IP, svc.Port, 0)
}
cache.delete(svcKey)
} | [
"func",
"DeleteServiceCache",
"(",
"svc",
"loadbalancer",
".",
"L3n4AddrID",
")",
"{",
"var",
"svcKey",
"ServiceKey",
"\n\n",
"if",
"!",
"svc",
".",
"IsIPv6",
"(",
")",
"{",
"svcKey",
"=",
"NewService4Key",
"(",
"svc",
".",
"IP",
",",
"svc",
".",
"Port",
",",
"0",
")",
"\n",
"}",
"else",
"{",
"svcKey",
"=",
"NewService6Key",
"(",
"svc",
".",
"IP",
",",
"svc",
".",
"Port",
",",
"0",
")",
"\n",
"}",
"\n\n",
"cache",
".",
"delete",
"(",
"svcKey",
")",
"\n",
"}"
] | // DeleteServiceCache deletes the service cache. | [
"DeleteServiceCache",
"deletes",
"the",
"service",
"cache",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/lbmap/lbmap.go#L954-L964 |
163,363 | cilium/cilium | pkg/datapath/loader/cache.go | Init | func Init(dp datapath.Datapath, nodeCfg *datapath.LocalNodeConfiguration) {
once.Do(func() {
templateCache = NewObjectCache(dp, nodeCfg)
ignorePrefixes := ignoredELFPrefixes
if !option.Config.EnableIPv4 {
ignorePrefixes = append(ignorePrefixes, "LXC_IPV4")
}
if !option.Config.EnableIPv6 {
ignorePrefixes = append(ignorePrefixes, "LXC_IP_")
}
elf.IgnoreSymbolPrefixes(ignorePrefixes)
})
templateCache.Update(nodeCfg)
} | go | func Init(dp datapath.Datapath, nodeCfg *datapath.LocalNodeConfiguration) {
once.Do(func() {
templateCache = NewObjectCache(dp, nodeCfg)
ignorePrefixes := ignoredELFPrefixes
if !option.Config.EnableIPv4 {
ignorePrefixes = append(ignorePrefixes, "LXC_IPV4")
}
if !option.Config.EnableIPv6 {
ignorePrefixes = append(ignorePrefixes, "LXC_IP_")
}
elf.IgnoreSymbolPrefixes(ignorePrefixes)
})
templateCache.Update(nodeCfg)
} | [
"func",
"Init",
"(",
"dp",
"datapath",
".",
"Datapath",
",",
"nodeCfg",
"*",
"datapath",
".",
"LocalNodeConfiguration",
")",
"{",
"once",
".",
"Do",
"(",
"func",
"(",
")",
"{",
"templateCache",
"=",
"NewObjectCache",
"(",
"dp",
",",
"nodeCfg",
")",
"\n",
"ignorePrefixes",
":=",
"ignoredELFPrefixes",
"\n",
"if",
"!",
"option",
".",
"Config",
".",
"EnableIPv4",
"{",
"ignorePrefixes",
"=",
"append",
"(",
"ignorePrefixes",
",",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"!",
"option",
".",
"Config",
".",
"EnableIPv6",
"{",
"ignorePrefixes",
"=",
"append",
"(",
"ignorePrefixes",
",",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"elf",
".",
"IgnoreSymbolPrefixes",
"(",
"ignorePrefixes",
")",
"\n",
"}",
")",
"\n",
"templateCache",
".",
"Update",
"(",
"nodeCfg",
")",
"\n",
"}"
] | // Init initializes the datapath cache with base program hashes derived from
// the LocalNodeConfiguration. | [
"Init",
"initializes",
"the",
"datapath",
"cache",
"with",
"base",
"program",
"hashes",
"derived",
"from",
"the",
"LocalNodeConfiguration",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/loader/cache.go#L67-L80 |
163,364 | cilium/cilium | pkg/datapath/loader/cache.go | RestoreTemplates | func RestoreTemplates(stateDir string) error {
// Simplest implementation: Just garbage-collect everything.
// In future we should make this smarter.
path := filepath.Join(stateDir, defaults.TemplatesDir)
err := os.RemoveAll(path)
if err == nil || os.IsNotExist(err) {
return nil
}
return &os.PathError{
Op: "failed to remove old BPF templates",
Path: path,
Err: err,
}
} | go | func RestoreTemplates(stateDir string) error {
// Simplest implementation: Just garbage-collect everything.
// In future we should make this smarter.
path := filepath.Join(stateDir, defaults.TemplatesDir)
err := os.RemoveAll(path)
if err == nil || os.IsNotExist(err) {
return nil
}
return &os.PathError{
Op: "failed to remove old BPF templates",
Path: path,
Err: err,
}
} | [
"func",
"RestoreTemplates",
"(",
"stateDir",
"string",
")",
"error",
"{",
"// Simplest implementation: Just garbage-collect everything.",
"// In future we should make this smarter.",
"path",
":=",
"filepath",
".",
"Join",
"(",
"stateDir",
",",
"defaults",
".",
"TemplatesDir",
")",
"\n",
"err",
":=",
"os",
".",
"RemoveAll",
"(",
"path",
")",
"\n",
"if",
"err",
"==",
"nil",
"||",
"os",
".",
"IsNotExist",
"(",
"err",
")",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"return",
"&",
"os",
".",
"PathError",
"{",
"Op",
":",
"\"",
"\"",
",",
"Path",
":",
"path",
",",
"Err",
":",
"err",
",",
"}",
"\n",
"}"
] | // RestoreTemplates populates the object cache from templates on the filesystem
// at the specified path. | [
"RestoreTemplates",
"populates",
"the",
"object",
"cache",
"from",
"templates",
"on",
"the",
"filesystem",
"at",
"the",
"specified",
"path",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/loader/cache.go#L84-L97 |
163,365 | cilium/cilium | pkg/datapath/loader/cache.go | NewObjectCache | func NewObjectCache(dp datapath.Datapath, nodeCfg *datapath.LocalNodeConfiguration) *objectCache {
return newObjectCache(dp, nodeCfg, option.Config.StateDir)
} | go | func NewObjectCache(dp datapath.Datapath, nodeCfg *datapath.LocalNodeConfiguration) *objectCache {
return newObjectCache(dp, nodeCfg, option.Config.StateDir)
} | [
"func",
"NewObjectCache",
"(",
"dp",
"datapath",
".",
"Datapath",
",",
"nodeCfg",
"*",
"datapath",
".",
"LocalNodeConfiguration",
")",
"*",
"objectCache",
"{",
"return",
"newObjectCache",
"(",
"dp",
",",
"nodeCfg",
",",
"option",
".",
"Config",
".",
"StateDir",
")",
"\n",
"}"
] | // NewObjectCache creates a new cache for datapath objects, basing the hash
// upon the configuration of the datapath and the specified node configuration. | [
"NewObjectCache",
"creates",
"a",
"new",
"cache",
"for",
"datapath",
"objects",
"basing",
"the",
"hash",
"upon",
"the",
"configuration",
"of",
"the",
"datapath",
"and",
"the",
"specified",
"node",
"configuration",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/loader/cache.go#L141-L143 |
163,366 | cilium/cilium | pkg/datapath/loader/cache.go | Update | func (o *objectCache) Update(nodeCfg *datapath.LocalNodeConfiguration) {
newHash := hashDatapath(o.Datapath, nodeCfg, nil, nil)
o.Lock()
defer o.Unlock()
o.baseHash = newHash
} | go | func (o *objectCache) Update(nodeCfg *datapath.LocalNodeConfiguration) {
newHash := hashDatapath(o.Datapath, nodeCfg, nil, nil)
o.Lock()
defer o.Unlock()
o.baseHash = newHash
} | [
"func",
"(",
"o",
"*",
"objectCache",
")",
"Update",
"(",
"nodeCfg",
"*",
"datapath",
".",
"LocalNodeConfiguration",
")",
"{",
"newHash",
":=",
"hashDatapath",
"(",
"o",
".",
"Datapath",
",",
"nodeCfg",
",",
"nil",
",",
"nil",
")",
"\n\n",
"o",
".",
"Lock",
"(",
")",
"\n",
"defer",
"o",
".",
"Unlock",
"(",
")",
"\n",
"o",
".",
"baseHash",
"=",
"newHash",
"\n",
"}"
] | // Update may be called to update the base hash for configuration of datapath
// configuration that applies across the node. | [
"Update",
"may",
"be",
"called",
"to",
"update",
"the",
"base",
"hash",
"for",
"configuration",
"of",
"datapath",
"configuration",
"that",
"applies",
"across",
"the",
"node",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/loader/cache.go#L147-L153 |
163,367 | cilium/cilium | pkg/datapath/loader/cache.go | serialize | func (o *objectCache) serialize(hash string) (fq *serializer.FunctionQueue, found bool) {
o.Lock()
defer o.Unlock()
fq, compiled := o.compileQueue[hash]
if !compiled {
fq = serializer.NewFunctionQueue(1)
o.compileQueue[hash] = fq
}
return fq, compiled
} | go | func (o *objectCache) serialize(hash string) (fq *serializer.FunctionQueue, found bool) {
o.Lock()
defer o.Unlock()
fq, compiled := o.compileQueue[hash]
if !compiled {
fq = serializer.NewFunctionQueue(1)
o.compileQueue[hash] = fq
}
return fq, compiled
} | [
"func",
"(",
"o",
"*",
"objectCache",
")",
"serialize",
"(",
"hash",
"string",
")",
"(",
"fq",
"*",
"serializer",
".",
"FunctionQueue",
",",
"found",
"bool",
")",
"{",
"o",
".",
"Lock",
"(",
")",
"\n",
"defer",
"o",
".",
"Unlock",
"(",
")",
"\n\n",
"fq",
",",
"compiled",
":=",
"o",
".",
"compileQueue",
"[",
"hash",
"]",
"\n",
"if",
"!",
"compiled",
"{",
"fq",
"=",
"serializer",
".",
"NewFunctionQueue",
"(",
"1",
")",
"\n",
"o",
".",
"compileQueue",
"[",
"hash",
"]",
"=",
"fq",
"\n",
"}",
"\n",
"return",
"fq",
",",
"compiled",
"\n",
"}"
] | // serialize finds the channel that serializes builds against the same hash.
// Returns the channel and whether or not the caller needs to compile the
// datapath for this hash. | [
"serialize",
"finds",
"the",
"channel",
"that",
"serializes",
"builds",
"against",
"the",
"same",
"hash",
".",
"Returns",
"the",
"channel",
"and",
"whether",
"or",
"not",
"the",
"caller",
"needs",
"to",
"compile",
"the",
"datapath",
"for",
"this",
"hash",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/loader/cache.go#L158-L168 |
163,368 | cilium/cilium | pkg/datapath/loader/cache.go | build | func (o *objectCache) build(ctx context.Context, cfg *templateCfg, hash string) error {
templatePath := filepath.Join(o.workingDirectory, defaults.TemplatesDir, hash)
headerPath := filepath.Join(templatePath, common.CHeaderFileName)
objectPath := filepath.Join(templatePath, endpointObj)
if err := os.MkdirAll(templatePath, defaults.StateDirRights); err != nil {
return &os.PathError{
Op: "failed to create template directory",
Path: templatePath,
Err: err,
}
}
f, err := os.Create(headerPath)
if err != nil {
return &os.PathError{
Op: "failed to open template header for writing",
Path: headerPath,
Err: err,
}
}
if err = o.Datapath.WriteEndpointConfig(f, cfg); err != nil {
return &os.PathError{
Op: "failed to write template header",
Path: headerPath,
Err: err,
}
}
cfg.stats.bpfCompilation.Start()
err = compileTemplate(ctx, templatePath)
cfg.stats.bpfCompilation.End(err == nil)
if err != nil {
return &os.PathError{
Op: "failed to compile template program",
Path: templatePath,
Err: err,
}
}
log.WithFields(logrus.Fields{
logfields.Path: objectPath,
logfields.BPFCompilationTime: cfg.stats.bpfCompilation.Total(),
}).Info("Compiled new BPF template")
o.insert(hash, objectPath)
return nil
} | go | func (o *objectCache) build(ctx context.Context, cfg *templateCfg, hash string) error {
templatePath := filepath.Join(o.workingDirectory, defaults.TemplatesDir, hash)
headerPath := filepath.Join(templatePath, common.CHeaderFileName)
objectPath := filepath.Join(templatePath, endpointObj)
if err := os.MkdirAll(templatePath, defaults.StateDirRights); err != nil {
return &os.PathError{
Op: "failed to create template directory",
Path: templatePath,
Err: err,
}
}
f, err := os.Create(headerPath)
if err != nil {
return &os.PathError{
Op: "failed to open template header for writing",
Path: headerPath,
Err: err,
}
}
if err = o.Datapath.WriteEndpointConfig(f, cfg); err != nil {
return &os.PathError{
Op: "failed to write template header",
Path: headerPath,
Err: err,
}
}
cfg.stats.bpfCompilation.Start()
err = compileTemplate(ctx, templatePath)
cfg.stats.bpfCompilation.End(err == nil)
if err != nil {
return &os.PathError{
Op: "failed to compile template program",
Path: templatePath,
Err: err,
}
}
log.WithFields(logrus.Fields{
logfields.Path: objectPath,
logfields.BPFCompilationTime: cfg.stats.bpfCompilation.Total(),
}).Info("Compiled new BPF template")
o.insert(hash, objectPath)
return nil
} | [
"func",
"(",
"o",
"*",
"objectCache",
")",
"build",
"(",
"ctx",
"context",
".",
"Context",
",",
"cfg",
"*",
"templateCfg",
",",
"hash",
"string",
")",
"error",
"{",
"templatePath",
":=",
"filepath",
".",
"Join",
"(",
"o",
".",
"workingDirectory",
",",
"defaults",
".",
"TemplatesDir",
",",
"hash",
")",
"\n",
"headerPath",
":=",
"filepath",
".",
"Join",
"(",
"templatePath",
",",
"common",
".",
"CHeaderFileName",
")",
"\n",
"objectPath",
":=",
"filepath",
".",
"Join",
"(",
"templatePath",
",",
"endpointObj",
")",
"\n\n",
"if",
"err",
":=",
"os",
".",
"MkdirAll",
"(",
"templatePath",
",",
"defaults",
".",
"StateDirRights",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"&",
"os",
".",
"PathError",
"{",
"Op",
":",
"\"",
"\"",
",",
"Path",
":",
"templatePath",
",",
"Err",
":",
"err",
",",
"}",
"\n",
"}",
"\n\n",
"f",
",",
"err",
":=",
"os",
".",
"Create",
"(",
"headerPath",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"&",
"os",
".",
"PathError",
"{",
"Op",
":",
"\"",
"\"",
",",
"Path",
":",
"headerPath",
",",
"Err",
":",
"err",
",",
"}",
"\n",
"}",
"\n\n",
"if",
"err",
"=",
"o",
".",
"Datapath",
".",
"WriteEndpointConfig",
"(",
"f",
",",
"cfg",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"&",
"os",
".",
"PathError",
"{",
"Op",
":",
"\"",
"\"",
",",
"Path",
":",
"headerPath",
",",
"Err",
":",
"err",
",",
"}",
"\n",
"}",
"\n\n",
"cfg",
".",
"stats",
".",
"bpfCompilation",
".",
"Start",
"(",
")",
"\n",
"err",
"=",
"compileTemplate",
"(",
"ctx",
",",
"templatePath",
")",
"\n",
"cfg",
".",
"stats",
".",
"bpfCompilation",
".",
"End",
"(",
"err",
"==",
"nil",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"&",
"os",
".",
"PathError",
"{",
"Op",
":",
"\"",
"\"",
",",
"Path",
":",
"templatePath",
",",
"Err",
":",
"err",
",",
"}",
"\n",
"}",
"\n\n",
"log",
".",
"WithFields",
"(",
"logrus",
".",
"Fields",
"{",
"logfields",
".",
"Path",
":",
"objectPath",
",",
"logfields",
".",
"BPFCompilationTime",
":",
"cfg",
".",
"stats",
".",
"bpfCompilation",
".",
"Total",
"(",
")",
",",
"}",
")",
".",
"Info",
"(",
"\"",
"\"",
")",
"\n\n",
"o",
".",
"insert",
"(",
"hash",
",",
"objectPath",
")",
"\n",
"return",
"nil",
"\n",
"}"
] | // build attempts to compile and cache a datapath template object file
// corresponding to the specified endpoint configuration. | [
"build",
"attempts",
"to",
"compile",
"and",
"cache",
"a",
"datapath",
"template",
"object",
"file",
"corresponding",
"to",
"the",
"specified",
"endpoint",
"configuration",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/loader/cache.go#L205-L253 |
163,369 | cilium/cilium | pkg/datapath/loader/cache.go | fetchOrCompile | func (o *objectCache) fetchOrCompile(ctx context.Context, cfg datapath.EndpointConfiguration, stats *SpanStat) (path string, compiled bool, err error) {
var hash string
hash, err = o.baseHash.sumEndpoint(o, cfg, false)
if err != nil {
return "", false, err
}
// Capture the time spent waiting for the template to compile.
if stats != nil {
stats.bpfWaitForELF.Start()
defer func() {
// Wrap to ensure that "err" is compared upon return.
stats.bpfWaitForELF.End(err == nil)
}()
}
scopedLog := log.WithField(logfields.BPFHeaderfileHash, hash)
// Serializes attempts to compile this cfg.
fq, compiled := o.serialize(hash)
if !compiled {
fq.Enqueue(func() error {
defer fq.Stop()
templateCfg := wrap(cfg, stats)
err := o.build(ctx, templateCfg, hash)
if err != nil {
scopedLog.WithError(err).Error("BPF template object creation failed")
}
return err
}, serializer.NoRetry)
}
// Wait until the build completes.
if err = fq.Wait(ctx); err != nil {
scopedLog.WithError(err).Warning("Error while waiting for BPF template compilation")
return "", false, fmt.Errorf("BPF template compilation failed: %s", err)
}
// Fetch the result of the compilation.
path, ok := o.lookup(hash)
if !ok {
err := fmt.Errorf("Could not locate previously compiled BPF template")
scopedLog.WithError(err).Warning("BPF template compilation unsuccessful")
return "", false, err
}
return path, !compiled, nil
} | go | func (o *objectCache) fetchOrCompile(ctx context.Context, cfg datapath.EndpointConfiguration, stats *SpanStat) (path string, compiled bool, err error) {
var hash string
hash, err = o.baseHash.sumEndpoint(o, cfg, false)
if err != nil {
return "", false, err
}
// Capture the time spent waiting for the template to compile.
if stats != nil {
stats.bpfWaitForELF.Start()
defer func() {
// Wrap to ensure that "err" is compared upon return.
stats.bpfWaitForELF.End(err == nil)
}()
}
scopedLog := log.WithField(logfields.BPFHeaderfileHash, hash)
// Serializes attempts to compile this cfg.
fq, compiled := o.serialize(hash)
if !compiled {
fq.Enqueue(func() error {
defer fq.Stop()
templateCfg := wrap(cfg, stats)
err := o.build(ctx, templateCfg, hash)
if err != nil {
scopedLog.WithError(err).Error("BPF template object creation failed")
}
return err
}, serializer.NoRetry)
}
// Wait until the build completes.
if err = fq.Wait(ctx); err != nil {
scopedLog.WithError(err).Warning("Error while waiting for BPF template compilation")
return "", false, fmt.Errorf("BPF template compilation failed: %s", err)
}
// Fetch the result of the compilation.
path, ok := o.lookup(hash)
if !ok {
err := fmt.Errorf("Could not locate previously compiled BPF template")
scopedLog.WithError(err).Warning("BPF template compilation unsuccessful")
return "", false, err
}
return path, !compiled, nil
} | [
"func",
"(",
"o",
"*",
"objectCache",
")",
"fetchOrCompile",
"(",
"ctx",
"context",
".",
"Context",
",",
"cfg",
"datapath",
".",
"EndpointConfiguration",
",",
"stats",
"*",
"SpanStat",
")",
"(",
"path",
"string",
",",
"compiled",
"bool",
",",
"err",
"error",
")",
"{",
"var",
"hash",
"string",
"\n",
"hash",
",",
"err",
"=",
"o",
".",
"baseHash",
".",
"sumEndpoint",
"(",
"o",
",",
"cfg",
",",
"false",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"false",
",",
"err",
"\n",
"}",
"\n\n",
"// Capture the time spent waiting for the template to compile.",
"if",
"stats",
"!=",
"nil",
"{",
"stats",
".",
"bpfWaitForELF",
".",
"Start",
"(",
")",
"\n",
"defer",
"func",
"(",
")",
"{",
"// Wrap to ensure that \"err\" is compared upon return.",
"stats",
".",
"bpfWaitForELF",
".",
"End",
"(",
"err",
"==",
"nil",
")",
"\n",
"}",
"(",
")",
"\n",
"}",
"\n\n",
"scopedLog",
":=",
"log",
".",
"WithField",
"(",
"logfields",
".",
"BPFHeaderfileHash",
",",
"hash",
")",
"\n\n",
"// Serializes attempts to compile this cfg.",
"fq",
",",
"compiled",
":=",
"o",
".",
"serialize",
"(",
"hash",
")",
"\n",
"if",
"!",
"compiled",
"{",
"fq",
".",
"Enqueue",
"(",
"func",
"(",
")",
"error",
"{",
"defer",
"fq",
".",
"Stop",
"(",
")",
"\n",
"templateCfg",
":=",
"wrap",
"(",
"cfg",
",",
"stats",
")",
"\n",
"err",
":=",
"o",
".",
"build",
"(",
"ctx",
",",
"templateCfg",
",",
"hash",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"scopedLog",
".",
"WithError",
"(",
"err",
")",
".",
"Error",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"return",
"err",
"\n",
"}",
",",
"serializer",
".",
"NoRetry",
")",
"\n",
"}",
"\n\n",
"// Wait until the build completes.",
"if",
"err",
"=",
"fq",
".",
"Wait",
"(",
"ctx",
")",
";",
"err",
"!=",
"nil",
"{",
"scopedLog",
".",
"WithError",
"(",
"err",
")",
".",
"Warning",
"(",
"\"",
"\"",
")",
"\n",
"return",
"\"",
"\"",
",",
"false",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"// Fetch the result of the compilation.",
"path",
",",
"ok",
":=",
"o",
".",
"lookup",
"(",
"hash",
")",
"\n",
"if",
"!",
"ok",
"{",
"err",
":=",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"scopedLog",
".",
"WithError",
"(",
"err",
")",
".",
"Warning",
"(",
"\"",
"\"",
")",
"\n",
"return",
"\"",
"\"",
",",
"false",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"path",
",",
"!",
"compiled",
",",
"nil",
"\n",
"}"
] | // fetchOrCompile attempts to fetch the path to the datapath object
// corresponding to the provided endpoint configuration, or if this
// configuration is not yet compiled, compiles it. It will block if multiple
// threads attempt to concurrently fetchOrCompile a template binary for the
// same set of EndpointConfiguration.
//
// Returns the path to the compiled template datapath object and whether the
// object was compiled, or an error. | [
"fetchOrCompile",
"attempts",
"to",
"fetch",
"the",
"path",
"to",
"the",
"datapath",
"object",
"corresponding",
"to",
"the",
"provided",
"endpoint",
"configuration",
"or",
"if",
"this",
"configuration",
"is",
"not",
"yet",
"compiled",
"compiles",
"it",
".",
"It",
"will",
"block",
"if",
"multiple",
"threads",
"attempt",
"to",
"concurrently",
"fetchOrCompile",
"a",
"template",
"binary",
"for",
"the",
"same",
"set",
"of",
"EndpointConfiguration",
".",
"Returns",
"the",
"path",
"to",
"the",
"compiled",
"template",
"datapath",
"object",
"and",
"whether",
"the",
"object",
"was",
"compiled",
"or",
"an",
"error",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/loader/cache.go#L263-L310 |
163,370 | cilium/cilium | pkg/datapath/loader/cache.go | EndpointHash | func EndpointHash(cfg datapath.EndpointConfiguration) (string, error) {
return templateCache.baseHash.sumEndpoint(templateCache, cfg, true)
} | go | func EndpointHash(cfg datapath.EndpointConfiguration) (string, error) {
return templateCache.baseHash.sumEndpoint(templateCache, cfg, true)
} | [
"func",
"EndpointHash",
"(",
"cfg",
"datapath",
".",
"EndpointConfiguration",
")",
"(",
"string",
",",
"error",
")",
"{",
"return",
"templateCache",
".",
"baseHash",
".",
"sumEndpoint",
"(",
"templateCache",
",",
"cfg",
",",
"true",
")",
"\n",
"}"
] | // EndpointHash hashes the specified endpoint configuration with the current
// datapath hash cache and returns the hash as string. | [
"EndpointHash",
"hashes",
"the",
"specified",
"endpoint",
"configuration",
"with",
"the",
"current",
"datapath",
"hash",
"cache",
"and",
"returns",
"the",
"hash",
"as",
"string",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/loader/cache.go#L357-L359 |
163,371 | cilium/cilium | pkg/envoy/xds/cache.go | NewCache | func NewCache() *Cache {
return &Cache{
BaseObservableResourceSource: NewBaseObservableResourceSource(),
resources: make(map[cacheKey]cacheValue),
version: 1,
}
} | go | func NewCache() *Cache {
return &Cache{
BaseObservableResourceSource: NewBaseObservableResourceSource(),
resources: make(map[cacheKey]cacheValue),
version: 1,
}
} | [
"func",
"NewCache",
"(",
")",
"*",
"Cache",
"{",
"return",
"&",
"Cache",
"{",
"BaseObservableResourceSource",
":",
"NewBaseObservableResourceSource",
"(",
")",
",",
"resources",
":",
"make",
"(",
"map",
"[",
"cacheKey",
"]",
"cacheValue",
")",
",",
"version",
":",
"1",
",",
"}",
"\n",
"}"
] | // NewCache creates a new, empty cache with 0 as its current version. | [
"NewCache",
"creates",
"a",
"new",
"empty",
"cache",
"with",
"0",
"as",
"its",
"current",
"version",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/envoy/xds/cache.go#L67-L73 |
163,372 | cilium/cilium | pkg/envoy/xds/cache.go | Lookup | func (c *Cache) Lookup(typeURL string, resourceName string) (proto.Message, error) {
res, err := c.GetResources(context.Background(), typeURL, 0, nil, []string{resourceName})
if err != nil || res == nil || len(res.Resources) == 0 {
return nil, err
}
return res.Resources[0], nil
} | go | func (c *Cache) Lookup(typeURL string, resourceName string) (proto.Message, error) {
res, err := c.GetResources(context.Background(), typeURL, 0, nil, []string{resourceName})
if err != nil || res == nil || len(res.Resources) == 0 {
return nil, err
}
return res.Resources[0], nil
} | [
"func",
"(",
"c",
"*",
"Cache",
")",
"Lookup",
"(",
"typeURL",
"string",
",",
"resourceName",
"string",
")",
"(",
"proto",
".",
"Message",
",",
"error",
")",
"{",
"res",
",",
"err",
":=",
"c",
".",
"GetResources",
"(",
"context",
".",
"Background",
"(",
")",
",",
"typeURL",
",",
"0",
",",
"nil",
",",
"[",
"]",
"string",
"{",
"resourceName",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"||",
"res",
"==",
"nil",
"||",
"len",
"(",
"res",
".",
"Resources",
")",
"==",
"0",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"res",
".",
"Resources",
"[",
"0",
"]",
",",
"nil",
"\n",
"}"
] | // Lookup finds the resource corresponding to the specified typeURL and resourceName,
// if available, and returns it. Otherwise, returns nil. If an error occurs while
// fetching the resource, also returns the error. | [
"Lookup",
"finds",
"the",
"resource",
"corresponding",
"to",
"the",
"specified",
"typeURL",
"and",
"resourceName",
"if",
"available",
"and",
"returns",
"it",
".",
"Otherwise",
"returns",
"nil",
".",
"If",
"an",
"error",
"occurs",
"while",
"fetching",
"the",
"resource",
"also",
"returns",
"the",
"error",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/envoy/xds/cache.go#L310-L316 |
163,373 | cilium/cilium | pkg/kvstore/backend.go | StatusCheckInterval | func (e *ExtraOptions) StatusCheckInterval(allConnected bool) time.Duration {
interval := 30 * time.Second
// Reduce the interval while connectivity issues are being detected
if !allConnected {
interval = 5 * time.Second
}
if e != nil && e.ClusterSizeDependantInterval != nil {
interval = e.ClusterSizeDependantInterval(interval)
}
return interval
} | go | func (e *ExtraOptions) StatusCheckInterval(allConnected bool) time.Duration {
interval := 30 * time.Second
// Reduce the interval while connectivity issues are being detected
if !allConnected {
interval = 5 * time.Second
}
if e != nil && e.ClusterSizeDependantInterval != nil {
interval = e.ClusterSizeDependantInterval(interval)
}
return interval
} | [
"func",
"(",
"e",
"*",
"ExtraOptions",
")",
"StatusCheckInterval",
"(",
"allConnected",
"bool",
")",
"time",
".",
"Duration",
"{",
"interval",
":=",
"30",
"*",
"time",
".",
"Second",
"\n\n",
"// Reduce the interval while connectivity issues are being detected",
"if",
"!",
"allConnected",
"{",
"interval",
"=",
"5",
"*",
"time",
".",
"Second",
"\n",
"}",
"\n\n",
"if",
"e",
"!=",
"nil",
"&&",
"e",
".",
"ClusterSizeDependantInterval",
"!=",
"nil",
"{",
"interval",
"=",
"e",
".",
"ClusterSizeDependantInterval",
"(",
"interval",
")",
"\n",
"}",
"\n",
"return",
"interval",
"\n",
"}"
] | // StatusCheckInterval returns the interval of status checks depending on the
// cluster size and the current connectivity state
//
// nodes OK Failing
// 1 20s 3s
// 4 45s 7s
// 8 1m05s 11s
// 32 1m45s 18s
// 128 2m25s 24s
// 512 3m07s 32s
// 2048 3m46s 38s
// 8192 4m30s 45s | [
"StatusCheckInterval",
"returns",
"the",
"interval",
"of",
"status",
"checks",
"depending",
"on",
"the",
"cluster",
"size",
"and",
"the",
"current",
"connectivity",
"state",
"nodes",
"OK",
"Failing",
"1",
"20s",
"3s",
"4",
"45s",
"7s",
"8",
"1m05s",
"11s",
"32",
"1m45s",
"18s",
"128",
"2m25s",
"24s",
"512",
"3m07s",
"32s",
"2048",
"3m46s",
"38s",
"8192",
"4m30s",
"45s"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/kvstore/backend.go#L59-L71 |
163,374 | cilium/cilium | pkg/kvstore/backend.go | registerBackend | func registerBackend(name string, module backendModule) {
if _, ok := registeredBackends[name]; ok {
log.Panicf("backend with name '%s' already registered", name)
}
registeredBackends[name] = module
} | go | func registerBackend(name string, module backendModule) {
if _, ok := registeredBackends[name]; ok {
log.Panicf("backend with name '%s' already registered", name)
}
registeredBackends[name] = module
} | [
"func",
"registerBackend",
"(",
"name",
"string",
",",
"module",
"backendModule",
")",
"{",
"if",
"_",
",",
"ok",
":=",
"registeredBackends",
"[",
"name",
"]",
";",
"ok",
"{",
"log",
".",
"Panicf",
"(",
"\"",
"\"",
",",
"name",
")",
"\n",
"}",
"\n\n",
"registeredBackends",
"[",
"name",
"]",
"=",
"module",
"\n",
"}"
] | // registerBackend must be called by kvstore backends to register themselves | [
"registerBackend",
"must",
"be",
"called",
"by",
"kvstore",
"backends",
"to",
"register",
"themselves"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/kvstore/backend.go#L108-L114 |
163,375 | cilium/cilium | pkg/kvstore/backend.go | getBackend | func getBackend(name string) backendModule {
if backend, ok := registeredBackends[name]; ok {
return backend.createInstance()
}
return nil
} | go | func getBackend(name string) backendModule {
if backend, ok := registeredBackends[name]; ok {
return backend.createInstance()
}
return nil
} | [
"func",
"getBackend",
"(",
"name",
"string",
")",
"backendModule",
"{",
"if",
"backend",
",",
"ok",
":=",
"registeredBackends",
"[",
"name",
"]",
";",
"ok",
"{",
"return",
"backend",
".",
"createInstance",
"(",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // getBackend finds a registered backend by name | [
"getBackend",
"finds",
"a",
"registered",
"backend",
"by",
"name"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/kvstore/backend.go#L117-L123 |
163,376 | cilium/cilium | pkg/option/config.go | getEnvName | func getEnvName(option string) string {
under := strings.Replace(option, "-", "_", -1)
upper := strings.ToUpper(under)
return ciliumEnvPrefix + upper
} | go | func getEnvName(option string) string {
under := strings.Replace(option, "-", "_", -1)
upper := strings.ToUpper(under)
return ciliumEnvPrefix + upper
} | [
"func",
"getEnvName",
"(",
"option",
"string",
")",
"string",
"{",
"under",
":=",
"strings",
".",
"Replace",
"(",
"option",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"-",
"1",
")",
"\n",
"upper",
":=",
"strings",
".",
"ToUpper",
"(",
"under",
")",
"\n",
"return",
"ciliumEnvPrefix",
"+",
"upper",
"\n",
"}"
] | // getEnvName returns the environment variable to be used for the given option name. | [
"getEnvName",
"returns",
"the",
"environment",
"variable",
"to",
"be",
"used",
"for",
"the",
"given",
"option",
"name",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/option/config.go#L516-L520 |
163,377 | cilium/cilium | pkg/option/config.go | BindEnv | func BindEnv(optName string) {
registerOpt(optName)
viper.BindEnv(optName, getEnvName(optName))
} | go | func BindEnv(optName string) {
registerOpt(optName)
viper.BindEnv(optName, getEnvName(optName))
} | [
"func",
"BindEnv",
"(",
"optName",
"string",
")",
"{",
"registerOpt",
"(",
"optName",
")",
"\n",
"viper",
".",
"BindEnv",
"(",
"optName",
",",
"getEnvName",
"(",
"optName",
")",
")",
"\n",
"}"
] | // BindEnv binds the option name with an deterministic generated environment
// variable which s based on the given optName. If the same optName is bind
// more than 1 time, this function panics. | [
"BindEnv",
"binds",
"the",
"option",
"name",
"with",
"an",
"deterministic",
"generated",
"environment",
"variable",
"which",
"s",
"based",
"on",
"the",
"given",
"optName",
".",
"If",
"the",
"same",
"optName",
"is",
"bind",
"more",
"than",
"1",
"time",
"this",
"function",
"panics",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/option/config.go#L528-L531 |
163,378 | cilium/cilium | pkg/option/config.go | BindEnvWithLegacyEnvFallback | func BindEnvWithLegacyEnvFallback(optName, legacyEnvName string) {
registerOpt(optName)
envName := getEnvName(optName)
if os.Getenv(envName) == "" {
envName = legacyEnvName
}
viper.BindEnv(optName, envName)
} | go | func BindEnvWithLegacyEnvFallback(optName, legacyEnvName string) {
registerOpt(optName)
envName := getEnvName(optName)
if os.Getenv(envName) == "" {
envName = legacyEnvName
}
viper.BindEnv(optName, envName)
} | [
"func",
"BindEnvWithLegacyEnvFallback",
"(",
"optName",
",",
"legacyEnvName",
"string",
")",
"{",
"registerOpt",
"(",
"optName",
")",
"\n\n",
"envName",
":=",
"getEnvName",
"(",
"optName",
")",
"\n",
"if",
"os",
".",
"Getenv",
"(",
"envName",
")",
"==",
"\"",
"\"",
"{",
"envName",
"=",
"legacyEnvName",
"\n",
"}",
"\n\n",
"viper",
".",
"BindEnv",
"(",
"optName",
",",
"envName",
")",
"\n",
"}"
] | // BindEnvWithLegacyEnvFallback binds the given option name with either the same
// environment variable as BindEnv, if it's set, or with the given legacyEnvName.
//
// The function is used to work around the viper.BindEnv limitation that only
// one environment variable can be bound for an option, and we need multiple
// environment variables due to backward compatibility reasons. | [
"BindEnvWithLegacyEnvFallback",
"binds",
"the",
"given",
"option",
"name",
"with",
"either",
"the",
"same",
"environment",
"variable",
"as",
"BindEnv",
"if",
"it",
"s",
"set",
"or",
"with",
"the",
"given",
"legacyEnvName",
".",
"The",
"function",
"is",
"used",
"to",
"work",
"around",
"the",
"viper",
".",
"BindEnv",
"limitation",
"that",
"only",
"one",
"environment",
"variable",
"can",
"be",
"bound",
"for",
"an",
"option",
"and",
"we",
"need",
"multiple",
"environment",
"variables",
"due",
"to",
"backward",
"compatibility",
"reasons",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/option/config.go#L539-L548 |
163,379 | cilium/cilium | pkg/option/config.go | LogRegisteredOptions | func LogRegisteredOptions(entry *logrus.Entry) {
keys := make([]string, 0, len(RegisteredOptions))
for k := range RegisteredOptions {
keys = append(keys, k)
}
sort.Strings(keys)
for _, k := range keys {
entry.Infof(" --%s='%s'", k, viper.GetString(k))
}
} | go | func LogRegisteredOptions(entry *logrus.Entry) {
keys := make([]string, 0, len(RegisteredOptions))
for k := range RegisteredOptions {
keys = append(keys, k)
}
sort.Strings(keys)
for _, k := range keys {
entry.Infof(" --%s='%s'", k, viper.GetString(k))
}
} | [
"func",
"LogRegisteredOptions",
"(",
"entry",
"*",
"logrus",
".",
"Entry",
")",
"{",
"keys",
":=",
"make",
"(",
"[",
"]",
"string",
",",
"0",
",",
"len",
"(",
"RegisteredOptions",
")",
")",
"\n",
"for",
"k",
":=",
"range",
"RegisteredOptions",
"{",
"keys",
"=",
"append",
"(",
"keys",
",",
"k",
")",
"\n",
"}",
"\n",
"sort",
".",
"Strings",
"(",
"keys",
")",
"\n",
"for",
"_",
",",
"k",
":=",
"range",
"keys",
"{",
"entry",
".",
"Infof",
"(",
"\"",
"\"",
",",
"k",
",",
"viper",
".",
"GetString",
"(",
"k",
")",
")",
"\n",
"}",
"\n",
"}"
] | // LogRegisteredOptions logs all options that where bind to viper. | [
"LogRegisteredOptions",
"logs",
"all",
"options",
"that",
"where",
"bind",
"to",
"viper",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/option/config.go#L559-L568 |
163,380 | cilium/cilium | pkg/option/config.go | GetNodeConfigPath | func (c *DaemonConfig) GetNodeConfigPath() string {
return filepath.Join(c.GetGlobalsDir(), common.NodeConfigFile)
} | go | func (c *DaemonConfig) GetNodeConfigPath() string {
return filepath.Join(c.GetGlobalsDir(), common.NodeConfigFile)
} | [
"func",
"(",
"c",
"*",
"DaemonConfig",
")",
"GetNodeConfigPath",
"(",
")",
"string",
"{",
"return",
"filepath",
".",
"Join",
"(",
"c",
".",
"GetGlobalsDir",
"(",
")",
",",
"common",
".",
"NodeConfigFile",
")",
"\n",
"}"
] | // GetNodeConfigPath returns the full path of the NodeConfigFile. | [
"GetNodeConfigPath",
"returns",
"the",
"full",
"path",
"of",
"the",
"NodeConfigFile",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/option/config.go#L924-L926 |
163,381 | cilium/cilium | pkg/option/config.go | WorkloadsEnabled | func (c *DaemonConfig) WorkloadsEnabled() bool {
for _, w := range c.Workloads {
if w == "none" {
return false
}
}
return len(c.Workloads) > 0
} | go | func (c *DaemonConfig) WorkloadsEnabled() bool {
for _, w := range c.Workloads {
if w == "none" {
return false
}
}
return len(c.Workloads) > 0
} | [
"func",
"(",
"c",
"*",
"DaemonConfig",
")",
"WorkloadsEnabled",
"(",
")",
"bool",
"{",
"for",
"_",
",",
"w",
":=",
"range",
"c",
".",
"Workloads",
"{",
"if",
"w",
"==",
"\"",
"\"",
"{",
"return",
"false",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"len",
"(",
"c",
".",
"Workloads",
")",
">",
"0",
"\n",
"}"
] | // WorkloadsEnabled returns true if any workload runtimes are enabled | [
"WorkloadsEnabled",
"returns",
"true",
"if",
"any",
"workload",
"runtimes",
"are",
"enabled"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/option/config.go#L934-L942 |
163,382 | cilium/cilium | pkg/option/config.go | AlwaysAllowLocalhost | func (c *DaemonConfig) AlwaysAllowLocalhost() bool {
switch c.AllowLocalhost {
case AllowLocalhostAlways:
return true
case AllowLocalhostAuto, AllowLocalhostPolicy:
return false
default:
return false
}
} | go | func (c *DaemonConfig) AlwaysAllowLocalhost() bool {
switch c.AllowLocalhost {
case AllowLocalhostAlways:
return true
case AllowLocalhostAuto, AllowLocalhostPolicy:
return false
default:
return false
}
} | [
"func",
"(",
"c",
"*",
"DaemonConfig",
")",
"AlwaysAllowLocalhost",
"(",
")",
"bool",
"{",
"switch",
"c",
".",
"AllowLocalhost",
"{",
"case",
"AllowLocalhostAlways",
":",
"return",
"true",
"\n",
"case",
"AllowLocalhostAuto",
",",
"AllowLocalhostPolicy",
":",
"return",
"false",
"\n",
"default",
":",
"return",
"false",
"\n",
"}",
"\n",
"}"
] | // AlwaysAllowLocalhost returns true if the daemon has the option set that
// localhost can always reach local endpoints | [
"AlwaysAllowLocalhost",
"returns",
"true",
"if",
"the",
"daemon",
"has",
"the",
"option",
"set",
"that",
"localhost",
"can",
"always",
"reach",
"local",
"endpoints"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/option/config.go#L946-L955 |
163,383 | cilium/cilium | pkg/option/config.go | Validate | func (c *DaemonConfig) Validate() error {
if err := c.validateIPv6ClusterAllocCIDR(); err != nil {
return fmt.Errorf("unable to parse CIDR value '%s' of option --%s: %s",
c.IPv6ClusterAllocCIDR, IPv6ClusterAllocCIDRName, err)
}
if c.MTU < 0 {
return fmt.Errorf("MTU '%d' cannot be negative", c.MTU)
}
switch c.Tunnel {
case TunnelVXLAN, TunnelGeneve, "":
case TunnelDisabled:
if c.UseSingleClusterRoute {
return fmt.Errorf("option --%s cannot be used in combination with --%s=%s",
SingleClusterRouteName, TunnelName, TunnelDisabled)
}
default:
return fmt.Errorf("invalid tunnel mode '%s', valid modes = {%s}", c.Tunnel, GetTunnelModes())
}
if c.ClusterID < ClusterIDMin || c.ClusterID > ClusterIDMax {
return fmt.Errorf("invalid cluster id %d: must be in range %d..%d",
c.ClusterID, ClusterIDMin, ClusterIDMax)
}
if c.ClusterID != 0 {
if c.ClusterName == defaults.ClusterName {
return fmt.Errorf("cannot use default cluster name (%s) with option %s",
defaults.ClusterName, ClusterIDName)
}
}
ctTableMin := 1 << 10 // 1Ki entries
ctTableMax := 1 << 24 // 16Mi entries (~1GiB of entries per map)
if c.CTMapEntriesGlobalTCP < ctTableMin || c.CTMapEntriesGlobalAny < ctTableMin {
return fmt.Errorf("Specified CT tables values %d/%d must exceed minimum %d",
c.CTMapEntriesGlobalTCP, c.CTMapEntriesGlobalAny, ctTableMin)
}
if c.CTMapEntriesGlobalTCP > ctTableMax || c.CTMapEntriesGlobalAny > ctTableMax {
return fmt.Errorf("Specified CT tables values %d/%d must not exceed maximum %d",
c.CTMapEntriesGlobalTCP, c.CTMapEntriesGlobalAny, ctTableMax)
}
return nil
} | go | func (c *DaemonConfig) Validate() error {
if err := c.validateIPv6ClusterAllocCIDR(); err != nil {
return fmt.Errorf("unable to parse CIDR value '%s' of option --%s: %s",
c.IPv6ClusterAllocCIDR, IPv6ClusterAllocCIDRName, err)
}
if c.MTU < 0 {
return fmt.Errorf("MTU '%d' cannot be negative", c.MTU)
}
switch c.Tunnel {
case TunnelVXLAN, TunnelGeneve, "":
case TunnelDisabled:
if c.UseSingleClusterRoute {
return fmt.Errorf("option --%s cannot be used in combination with --%s=%s",
SingleClusterRouteName, TunnelName, TunnelDisabled)
}
default:
return fmt.Errorf("invalid tunnel mode '%s', valid modes = {%s}", c.Tunnel, GetTunnelModes())
}
if c.ClusterID < ClusterIDMin || c.ClusterID > ClusterIDMax {
return fmt.Errorf("invalid cluster id %d: must be in range %d..%d",
c.ClusterID, ClusterIDMin, ClusterIDMax)
}
if c.ClusterID != 0 {
if c.ClusterName == defaults.ClusterName {
return fmt.Errorf("cannot use default cluster name (%s) with option %s",
defaults.ClusterName, ClusterIDName)
}
}
ctTableMin := 1 << 10 // 1Ki entries
ctTableMax := 1 << 24 // 16Mi entries (~1GiB of entries per map)
if c.CTMapEntriesGlobalTCP < ctTableMin || c.CTMapEntriesGlobalAny < ctTableMin {
return fmt.Errorf("Specified CT tables values %d/%d must exceed minimum %d",
c.CTMapEntriesGlobalTCP, c.CTMapEntriesGlobalAny, ctTableMin)
}
if c.CTMapEntriesGlobalTCP > ctTableMax || c.CTMapEntriesGlobalAny > ctTableMax {
return fmt.Errorf("Specified CT tables values %d/%d must not exceed maximum %d",
c.CTMapEntriesGlobalTCP, c.CTMapEntriesGlobalAny, ctTableMax)
}
return nil
} | [
"func",
"(",
"c",
"*",
"DaemonConfig",
")",
"Validate",
"(",
")",
"error",
"{",
"if",
"err",
":=",
"c",
".",
"validateIPv6ClusterAllocCIDR",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"c",
".",
"IPv6ClusterAllocCIDR",
",",
"IPv6ClusterAllocCIDRName",
",",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"c",
".",
"MTU",
"<",
"0",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"c",
".",
"MTU",
")",
"\n",
"}",
"\n\n",
"switch",
"c",
".",
"Tunnel",
"{",
"case",
"TunnelVXLAN",
",",
"TunnelGeneve",
",",
"\"",
"\"",
":",
"case",
"TunnelDisabled",
":",
"if",
"c",
".",
"UseSingleClusterRoute",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"SingleClusterRouteName",
",",
"TunnelName",
",",
"TunnelDisabled",
")",
"\n",
"}",
"\n",
"default",
":",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"c",
".",
"Tunnel",
",",
"GetTunnelModes",
"(",
")",
")",
"\n",
"}",
"\n\n",
"if",
"c",
".",
"ClusterID",
"<",
"ClusterIDMin",
"||",
"c",
".",
"ClusterID",
">",
"ClusterIDMax",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"c",
".",
"ClusterID",
",",
"ClusterIDMin",
",",
"ClusterIDMax",
")",
"\n",
"}",
"\n\n",
"if",
"c",
".",
"ClusterID",
"!=",
"0",
"{",
"if",
"c",
".",
"ClusterName",
"==",
"defaults",
".",
"ClusterName",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"defaults",
".",
"ClusterName",
",",
"ClusterIDName",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"ctTableMin",
":=",
"1",
"<<",
"10",
"// 1Ki entries",
"\n",
"ctTableMax",
":=",
"1",
"<<",
"24",
"// 16Mi entries (~1GiB of entries per map)",
"\n",
"if",
"c",
".",
"CTMapEntriesGlobalTCP",
"<",
"ctTableMin",
"||",
"c",
".",
"CTMapEntriesGlobalAny",
"<",
"ctTableMin",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"c",
".",
"CTMapEntriesGlobalTCP",
",",
"c",
".",
"CTMapEntriesGlobalAny",
",",
"ctTableMin",
")",
"\n",
"}",
"\n",
"if",
"c",
".",
"CTMapEntriesGlobalTCP",
">",
"ctTableMax",
"||",
"c",
".",
"CTMapEntriesGlobalAny",
">",
"ctTableMax",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"c",
".",
"CTMapEntriesGlobalTCP",
",",
"c",
".",
"CTMapEntriesGlobalAny",
",",
"ctTableMax",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Validate validates the daemon configuration | [
"Validate",
"validates",
"the",
"daemon",
"configuration"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/option/config.go#L988-L1033 |
163,384 | cilium/cilium | pkg/option/config.go | ReadDirConfig | func ReadDirConfig(dirName string) (map[string]interface{}, error) {
m := map[string]interface{}{}
fi, err := ioutil.ReadDir(dirName)
if err != nil && !os.IsNotExist(err) {
return nil, fmt.Errorf("unable to read configuration directory: %s", err)
}
for _, f := range fi {
if f.Mode().IsDir() {
continue
}
fName := filepath.Join(dirName, f.Name())
// the file can still be a symlink to a directory
if f.Mode()&os.ModeSymlink == 0 {
absFileName, err := filepath.EvalSymlinks(fName)
if err != nil {
log.Warnf("Unable to read configuration file %q: %s", absFileName, err)
continue
}
fName = absFileName
}
f, err = os.Stat(fName)
if err != nil {
log.Warnf("Unable to read configuration file %q: %s", fName, err)
continue
}
if f.Mode().IsDir() {
continue
}
b, err := ioutil.ReadFile(fName)
if err != nil {
log.Warnf("Unable to read configuration file %q: %s", fName, err)
continue
}
m[f.Name()] = string(bytes.TrimSpace(b))
}
return m, nil
} | go | func ReadDirConfig(dirName string) (map[string]interface{}, error) {
m := map[string]interface{}{}
fi, err := ioutil.ReadDir(dirName)
if err != nil && !os.IsNotExist(err) {
return nil, fmt.Errorf("unable to read configuration directory: %s", err)
}
for _, f := range fi {
if f.Mode().IsDir() {
continue
}
fName := filepath.Join(dirName, f.Name())
// the file can still be a symlink to a directory
if f.Mode()&os.ModeSymlink == 0 {
absFileName, err := filepath.EvalSymlinks(fName)
if err != nil {
log.Warnf("Unable to read configuration file %q: %s", absFileName, err)
continue
}
fName = absFileName
}
f, err = os.Stat(fName)
if err != nil {
log.Warnf("Unable to read configuration file %q: %s", fName, err)
continue
}
if f.Mode().IsDir() {
continue
}
b, err := ioutil.ReadFile(fName)
if err != nil {
log.Warnf("Unable to read configuration file %q: %s", fName, err)
continue
}
m[f.Name()] = string(bytes.TrimSpace(b))
}
return m, nil
} | [
"func",
"ReadDirConfig",
"(",
"dirName",
"string",
")",
"(",
"map",
"[",
"string",
"]",
"interface",
"{",
"}",
",",
"error",
")",
"{",
"m",
":=",
"map",
"[",
"string",
"]",
"interface",
"{",
"}",
"{",
"}",
"\n",
"fi",
",",
"err",
":=",
"ioutil",
".",
"ReadDir",
"(",
"dirName",
")",
"\n",
"if",
"err",
"!=",
"nil",
"&&",
"!",
"os",
".",
"IsNotExist",
"(",
"err",
")",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"for",
"_",
",",
"f",
":=",
"range",
"fi",
"{",
"if",
"f",
".",
"Mode",
"(",
")",
".",
"IsDir",
"(",
")",
"{",
"continue",
"\n",
"}",
"\n",
"fName",
":=",
"filepath",
".",
"Join",
"(",
"dirName",
",",
"f",
".",
"Name",
"(",
")",
")",
"\n\n",
"// the file can still be a symlink to a directory",
"if",
"f",
".",
"Mode",
"(",
")",
"&",
"os",
".",
"ModeSymlink",
"==",
"0",
"{",
"absFileName",
",",
"err",
":=",
"filepath",
".",
"EvalSymlinks",
"(",
"fName",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Warnf",
"(",
"\"",
"\"",
",",
"absFileName",
",",
"err",
")",
"\n",
"continue",
"\n",
"}",
"\n",
"fName",
"=",
"absFileName",
"\n",
"}",
"\n\n",
"f",
",",
"err",
"=",
"os",
".",
"Stat",
"(",
"fName",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Warnf",
"(",
"\"",
"\"",
",",
"fName",
",",
"err",
")",
"\n",
"continue",
"\n",
"}",
"\n",
"if",
"f",
".",
"Mode",
"(",
")",
".",
"IsDir",
"(",
")",
"{",
"continue",
"\n",
"}",
"\n\n",
"b",
",",
"err",
":=",
"ioutil",
".",
"ReadFile",
"(",
"fName",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Warnf",
"(",
"\"",
"\"",
",",
"fName",
",",
"err",
")",
"\n",
"continue",
"\n",
"}",
"\n",
"m",
"[",
"f",
".",
"Name",
"(",
")",
"]",
"=",
"string",
"(",
"bytes",
".",
"TrimSpace",
"(",
"b",
")",
")",
"\n",
"}",
"\n",
"return",
"m",
",",
"nil",
"\n",
"}"
] | // ReadDirConfig reads the given directory and returns a map that maps the
// filename to the contents of that file. | [
"ReadDirConfig",
"reads",
"the",
"given",
"directory",
"and",
"returns",
"a",
"map",
"that",
"maps",
"the",
"filename",
"to",
"the",
"contents",
"of",
"that",
"file",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/option/config.go#L1037-L1076 |
163,385 | cilium/cilium | pkg/option/config.go | MergeConfig | func MergeConfig(m map[string]interface{}) error {
err := viper.MergeConfigMap(m)
if err != nil {
return fmt.Errorf("unable to read merge directory configuration: %s", err)
}
return nil
} | go | func MergeConfig(m map[string]interface{}) error {
err := viper.MergeConfigMap(m)
if err != nil {
return fmt.Errorf("unable to read merge directory configuration: %s", err)
}
return nil
} | [
"func",
"MergeConfig",
"(",
"m",
"map",
"[",
"string",
"]",
"interface",
"{",
"}",
")",
"error",
"{",
"err",
":=",
"viper",
".",
"MergeConfigMap",
"(",
"m",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // MergeConfig merges the given configuration map with viper's configuration. | [
"MergeConfig",
"merges",
"the",
"given",
"configuration",
"map",
"with",
"viper",
"s",
"configuration",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/option/config.go#L1079-L1085 |
163,386 | cilium/cilium | pkg/option/config.go | ReplaceDeprecatedFields | func ReplaceDeprecatedFields(m map[string]interface{}) {
deprecatedFields := map[string]string{
"monitor-aggregation-level": MonitorAggregationName,
"ct-global-max-entries-tcp": CTMapEntriesGlobalTCPName,
"ct-global-max-entries-other": CTMapEntriesGlobalAnyName,
}
for deprecatedOption, newOption := range deprecatedFields {
if deprecatedValue, ok := m[deprecatedOption]; ok {
if _, ok := m[newOption]; !ok {
m[newOption] = deprecatedValue
}
}
}
} | go | func ReplaceDeprecatedFields(m map[string]interface{}) {
deprecatedFields := map[string]string{
"monitor-aggregation-level": MonitorAggregationName,
"ct-global-max-entries-tcp": CTMapEntriesGlobalTCPName,
"ct-global-max-entries-other": CTMapEntriesGlobalAnyName,
}
for deprecatedOption, newOption := range deprecatedFields {
if deprecatedValue, ok := m[deprecatedOption]; ok {
if _, ok := m[newOption]; !ok {
m[newOption] = deprecatedValue
}
}
}
} | [
"func",
"ReplaceDeprecatedFields",
"(",
"m",
"map",
"[",
"string",
"]",
"interface",
"{",
"}",
")",
"{",
"deprecatedFields",
":=",
"map",
"[",
"string",
"]",
"string",
"{",
"\"",
"\"",
":",
"MonitorAggregationName",
",",
"\"",
"\"",
":",
"CTMapEntriesGlobalTCPName",
",",
"\"",
"\"",
":",
"CTMapEntriesGlobalAnyName",
",",
"}",
"\n",
"for",
"deprecatedOption",
",",
"newOption",
":=",
"range",
"deprecatedFields",
"{",
"if",
"deprecatedValue",
",",
"ok",
":=",
"m",
"[",
"deprecatedOption",
"]",
";",
"ok",
"{",
"if",
"_",
",",
"ok",
":=",
"m",
"[",
"newOption",
"]",
";",
"!",
"ok",
"{",
"m",
"[",
"newOption",
"]",
"=",
"deprecatedValue",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // ReplaceDeprecatedFields replaces the deprecated options set with the new set
// of options that overwrite the deprecated ones.
// This function replaces the deprecated fields used by environment variables
// with a different name than the option they are setting. This also replaces
// the deprecated names used in the Kubernetes ConfigMap.
// Once we remove them from this function we also need to remove them from
// daemon_main.go and warn users about the old environment variable nor the
// option in the configuration map have any effect. | [
"ReplaceDeprecatedFields",
"replaces",
"the",
"deprecated",
"options",
"set",
"with",
"the",
"new",
"set",
"of",
"options",
"that",
"overwrite",
"the",
"deprecated",
"ones",
".",
"This",
"function",
"replaces",
"the",
"deprecated",
"fields",
"used",
"by",
"environment",
"variables",
"with",
"a",
"different",
"name",
"than",
"the",
"option",
"they",
"are",
"setting",
".",
"This",
"also",
"replaces",
"the",
"deprecated",
"names",
"used",
"in",
"the",
"Kubernetes",
"ConfigMap",
".",
"Once",
"we",
"remove",
"them",
"from",
"this",
"function",
"we",
"also",
"need",
"to",
"remove",
"them",
"from",
"daemon_main",
".",
"go",
"and",
"warn",
"users",
"about",
"the",
"old",
"environment",
"variable",
"nor",
"the",
"option",
"in",
"the",
"configuration",
"map",
"have",
"any",
"effect",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/option/config.go#L1095-L1108 |
163,387 | cilium/cilium | api/v1/models/datapath_mode.go | Validate | func (m DatapathMode) Validate(formats strfmt.Registry) error {
var res []error
// value enum
if err := m.validateDatapathModeEnum("", "body", m); err != nil {
return err
}
if len(res) > 0 {
return errors.CompositeValidationError(res...)
}
return nil
} | go | func (m DatapathMode) Validate(formats strfmt.Registry) error {
var res []error
// value enum
if err := m.validateDatapathModeEnum("", "body", m); err != nil {
return err
}
if len(res) > 0 {
return errors.CompositeValidationError(res...)
}
return nil
} | [
"func",
"(",
"m",
"DatapathMode",
")",
"Validate",
"(",
"formats",
"strfmt",
".",
"Registry",
")",
"error",
"{",
"var",
"res",
"[",
"]",
"error",
"\n\n",
"// value enum",
"if",
"err",
":=",
"m",
".",
"validateDatapathModeEnum",
"(",
"\"",
"\"",
",",
"\"",
"\"",
",",
"m",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"res",
")",
">",
"0",
"{",
"return",
"errors",
".",
"CompositeValidationError",
"(",
"res",
"...",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // Validate validates this datapath mode | [
"Validate",
"validates",
"this",
"datapath",
"mode"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/models/datapath_mode.go#L51-L63 |
163,388 | cilium/cilium | api/v1/models/ipvlan_configuration.go | Validate | func (m *IpvlanConfiguration) Validate(formats strfmt.Registry) error {
var res []error
if err := m.validateOperationMode(formats); err != nil {
res = append(res, err)
}
if len(res) > 0 {
return errors.CompositeValidationError(res...)
}
return nil
} | go | func (m *IpvlanConfiguration) Validate(formats strfmt.Registry) error {
var res []error
if err := m.validateOperationMode(formats); err != nil {
res = append(res, err)
}
if len(res) > 0 {
return errors.CompositeValidationError(res...)
}
return nil
} | [
"func",
"(",
"m",
"*",
"IpvlanConfiguration",
")",
"Validate",
"(",
"formats",
"strfmt",
".",
"Registry",
")",
"error",
"{",
"var",
"res",
"[",
"]",
"error",
"\n\n",
"if",
"err",
":=",
"m",
".",
"validateOperationMode",
"(",
"formats",
")",
";",
"err",
"!=",
"nil",
"{",
"res",
"=",
"append",
"(",
"res",
",",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"res",
")",
">",
"0",
"{",
"return",
"errors",
".",
"CompositeValidationError",
"(",
"res",
"...",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // Validate validates this ipvlan configuration | [
"Validate",
"validates",
"this",
"ipvlan",
"configuration"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/models/ipvlan_configuration.go#L31-L42 |
163,389 | cilium/cilium | api/v1/models/b_p_f_map_entry.go | Validate | func (m *BPFMapEntry) Validate(formats strfmt.Registry) error {
var res []error
if err := m.validateDesiredAction(formats); err != nil {
res = append(res, err)
}
if len(res) > 0 {
return errors.CompositeValidationError(res...)
}
return nil
} | go | func (m *BPFMapEntry) Validate(formats strfmt.Registry) error {
var res []error
if err := m.validateDesiredAction(formats); err != nil {
res = append(res, err)
}
if len(res) > 0 {
return errors.CompositeValidationError(res...)
}
return nil
} | [
"func",
"(",
"m",
"*",
"BPFMapEntry",
")",
"Validate",
"(",
"formats",
"strfmt",
".",
"Registry",
")",
"error",
"{",
"var",
"res",
"[",
"]",
"error",
"\n\n",
"if",
"err",
":=",
"m",
".",
"validateDesiredAction",
"(",
"formats",
")",
";",
"err",
"!=",
"nil",
"{",
"res",
"=",
"append",
"(",
"res",
",",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"res",
")",
">",
"0",
"{",
"return",
"errors",
".",
"CompositeValidationError",
"(",
"res",
"...",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // Validate validates this b p f map entry | [
"Validate",
"validates",
"this",
"b",
"p",
"f",
"map",
"entry"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/models/b_p_f_map_entry.go#L37-L48 |
163,390 | cilium/cilium | pkg/datapath/linux/config.go | WriteNetdevConfig | func (l *linuxDatapath) WriteNetdevConfig(w io.Writer, cfg datapath.DeviceConfiguration) error {
fw := bufio.NewWriter(w)
l.writeNetdevConfig(fw, cfg)
return fw.Flush()
} | go | func (l *linuxDatapath) WriteNetdevConfig(w io.Writer, cfg datapath.DeviceConfiguration) error {
fw := bufio.NewWriter(w)
l.writeNetdevConfig(fw, cfg)
return fw.Flush()
} | [
"func",
"(",
"l",
"*",
"linuxDatapath",
")",
"WriteNetdevConfig",
"(",
"w",
"io",
".",
"Writer",
",",
"cfg",
"datapath",
".",
"DeviceConfiguration",
")",
"error",
"{",
"fw",
":=",
"bufio",
".",
"NewWriter",
"(",
"w",
")",
"\n",
"l",
".",
"writeNetdevConfig",
"(",
"fw",
",",
"cfg",
")",
"\n",
"return",
"fw",
".",
"Flush",
"(",
")",
"\n",
"}"
] | // WriteNetdevConfig writes the BPF configuration for the endpoint to a writer. | [
"WriteNetdevConfig",
"writes",
"the",
"BPF",
"configuration",
"for",
"the",
"endpoint",
"to",
"a",
"writer",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/linux/config.go#L199-L203 |
163,391 | cilium/cilium | pkg/datapath/linux/config.go | WriteEndpointConfig | func (l *linuxDatapath) WriteEndpointConfig(w io.Writer, e datapath.EndpointConfiguration) error {
fw := bufio.NewWriter(w)
writeIncludes(w)
l.writeStaticData(fw, e)
return l.writeTemplateConfig(fw, e)
} | go | func (l *linuxDatapath) WriteEndpointConfig(w io.Writer, e datapath.EndpointConfiguration) error {
fw := bufio.NewWriter(w)
writeIncludes(w)
l.writeStaticData(fw, e)
return l.writeTemplateConfig(fw, e)
} | [
"func",
"(",
"l",
"*",
"linuxDatapath",
")",
"WriteEndpointConfig",
"(",
"w",
"io",
".",
"Writer",
",",
"e",
"datapath",
".",
"EndpointConfiguration",
")",
"error",
"{",
"fw",
":=",
"bufio",
".",
"NewWriter",
"(",
"w",
")",
"\n\n",
"writeIncludes",
"(",
"w",
")",
"\n",
"l",
".",
"writeStaticData",
"(",
"fw",
",",
"e",
")",
"\n\n",
"return",
"l",
".",
"writeTemplateConfig",
"(",
"fw",
",",
"e",
")",
"\n",
"}"
] | // WriteEndpointConfig writes the BPF configuration for the endpoint to a writer. | [
"WriteEndpointConfig",
"writes",
"the",
"BPF",
"configuration",
"for",
"the",
"endpoint",
"to",
"a",
"writer",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/linux/config.go#L225-L232 |
163,392 | cilium/cilium | pkg/datapath/linux/config.go | WriteTemplateConfig | func (l *linuxDatapath) WriteTemplateConfig(w io.Writer, e datapath.EndpointConfiguration) error {
fw := bufio.NewWriter(w)
return l.writeTemplateConfig(fw, e)
} | go | func (l *linuxDatapath) WriteTemplateConfig(w io.Writer, e datapath.EndpointConfiguration) error {
fw := bufio.NewWriter(w)
return l.writeTemplateConfig(fw, e)
} | [
"func",
"(",
"l",
"*",
"linuxDatapath",
")",
"WriteTemplateConfig",
"(",
"w",
"io",
".",
"Writer",
",",
"e",
"datapath",
".",
"EndpointConfiguration",
")",
"error",
"{",
"fw",
":=",
"bufio",
".",
"NewWriter",
"(",
"w",
")",
"\n",
"return",
"l",
".",
"writeTemplateConfig",
"(",
"fw",
",",
"e",
")",
"\n",
"}"
] | // WriteEndpointConfig writes the BPF configuration for the template to a writer. | [
"WriteEndpointConfig",
"writes",
"the",
"BPF",
"configuration",
"for",
"the",
"template",
"to",
"a",
"writer",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/linux/config.go#L262-L265 |
163,393 | cilium/cilium | pkg/datapath/ipcache/listener.go | updateStaleEntriesFunction | func updateStaleEntriesFunction(keysToRemove map[string]*ipcacheMap.Key) bpf.DumpCallback {
return func(key bpf.MapKey, value bpf.MapValue) {
k := key.(*ipcacheMap.Key)
keyToIP := k.String()
// Don't RLock as part of the same goroutine.
if i, exists := ipcache.IPIdentityCache.LookupByPrefixRLocked(keyToIP); !exists {
switch i.Source {
case ipcache.FromKVStore, ipcache.FromAgentLocal:
// Cannot delete from map during callback because DumpWithCallback
// RLocks the map.
keysToRemove[keyToIP] = k
}
}
}
} | go | func updateStaleEntriesFunction(keysToRemove map[string]*ipcacheMap.Key) bpf.DumpCallback {
return func(key bpf.MapKey, value bpf.MapValue) {
k := key.(*ipcacheMap.Key)
keyToIP := k.String()
// Don't RLock as part of the same goroutine.
if i, exists := ipcache.IPIdentityCache.LookupByPrefixRLocked(keyToIP); !exists {
switch i.Source {
case ipcache.FromKVStore, ipcache.FromAgentLocal:
// Cannot delete from map during callback because DumpWithCallback
// RLocks the map.
keysToRemove[keyToIP] = k
}
}
}
} | [
"func",
"updateStaleEntriesFunction",
"(",
"keysToRemove",
"map",
"[",
"string",
"]",
"*",
"ipcacheMap",
".",
"Key",
")",
"bpf",
".",
"DumpCallback",
"{",
"return",
"func",
"(",
"key",
"bpf",
".",
"MapKey",
",",
"value",
"bpf",
".",
"MapValue",
")",
"{",
"k",
":=",
"key",
".",
"(",
"*",
"ipcacheMap",
".",
"Key",
")",
"\n",
"keyToIP",
":=",
"k",
".",
"String",
"(",
")",
"\n\n",
"// Don't RLock as part of the same goroutine.",
"if",
"i",
",",
"exists",
":=",
"ipcache",
".",
"IPIdentityCache",
".",
"LookupByPrefixRLocked",
"(",
"keyToIP",
")",
";",
"!",
"exists",
"{",
"switch",
"i",
".",
"Source",
"{",
"case",
"ipcache",
".",
"FromKVStore",
",",
"ipcache",
".",
"FromAgentLocal",
":",
"// Cannot delete from map during callback because DumpWithCallback",
"// RLocks the map.",
"keysToRemove",
"[",
"keyToIP",
"]",
"=",
"k",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // updateStaleEntriesFunction returns a DumpCallback that will update the
// specified "keysToRemove" map with entries that exist in the BPF map which
// do not exist in the in-memory ipcache.
//
// Must be called while holding ipcache.IPIdentityCache.Lock for reading. | [
"updateStaleEntriesFunction",
"returns",
"a",
"DumpCallback",
"that",
"will",
"update",
"the",
"specified",
"keysToRemove",
"map",
"with",
"entries",
"that",
"exist",
"in",
"the",
"BPF",
"map",
"which",
"do",
"not",
"exist",
"in",
"the",
"in",
"-",
"memory",
"ipcache",
".",
"Must",
"be",
"called",
"while",
"holding",
"ipcache",
".",
"IPIdentityCache",
".",
"Lock",
"for",
"reading",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/ipcache/listener.go#L136-L151 |
163,394 | cilium/cilium | pkg/datapath/ipcache/listener.go | handleMapShuffleFailure | func handleMapShuffleFailure(src, dst string) {
backupPath := bpf.MapPath(src)
realizedPath := bpf.MapPath(dst)
if err := os.Rename(backupPath, realizedPath); err != nil {
log.WithError(err).WithFields(logrus.Fields{
logfields.BPFMapPath: realizedPath,
}).Warningf("Unable to recover during error renaming map paths")
}
} | go | func handleMapShuffleFailure(src, dst string) {
backupPath := bpf.MapPath(src)
realizedPath := bpf.MapPath(dst)
if err := os.Rename(backupPath, realizedPath); err != nil {
log.WithError(err).WithFields(logrus.Fields{
logfields.BPFMapPath: realizedPath,
}).Warningf("Unable to recover during error renaming map paths")
}
} | [
"func",
"handleMapShuffleFailure",
"(",
"src",
",",
"dst",
"string",
")",
"{",
"backupPath",
":=",
"bpf",
".",
"MapPath",
"(",
"src",
")",
"\n",
"realizedPath",
":=",
"bpf",
".",
"MapPath",
"(",
"dst",
")",
"\n\n",
"if",
"err",
":=",
"os",
".",
"Rename",
"(",
"backupPath",
",",
"realizedPath",
")",
";",
"err",
"!=",
"nil",
"{",
"log",
".",
"WithError",
"(",
"err",
")",
".",
"WithFields",
"(",
"logrus",
".",
"Fields",
"{",
"logfields",
".",
"BPFMapPath",
":",
"realizedPath",
",",
"}",
")",
".",
"Warningf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}"
] | // handleMapShuffleFailure attempts to move the map with name 'backup' back to
// 'realized', and logs a warning message if this can't be achieved. | [
"handleMapShuffleFailure",
"attempts",
"to",
"move",
"the",
"map",
"with",
"name",
"backup",
"back",
"to",
"realized",
"and",
"logs",
"a",
"warning",
"message",
"if",
"this",
"can",
"t",
"be",
"achieved",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/ipcache/listener.go#L155-L164 |
163,395 | cilium/cilium | pkg/datapath/ipcache/listener.go | shuffleMaps | func shuffleMaps(realized, backup, pending string) error {
realizedPath := bpf.MapPath(realized)
backupPath := bpf.MapPath(backup)
pendingPath := bpf.MapPath(pending)
if err := os.Rename(realizedPath, backupPath); err != nil && !os.IsNotExist(err) {
return fmt.Errorf("Unable to back up existing ipcache: %s", err)
}
if err := os.Rename(pendingPath, realizedPath); err != nil {
handleMapShuffleFailure(backup, realized)
return fmt.Errorf("Unable to shift ipcache into new location: %s", err)
}
return nil
} | go | func shuffleMaps(realized, backup, pending string) error {
realizedPath := bpf.MapPath(realized)
backupPath := bpf.MapPath(backup)
pendingPath := bpf.MapPath(pending)
if err := os.Rename(realizedPath, backupPath); err != nil && !os.IsNotExist(err) {
return fmt.Errorf("Unable to back up existing ipcache: %s", err)
}
if err := os.Rename(pendingPath, realizedPath); err != nil {
handleMapShuffleFailure(backup, realized)
return fmt.Errorf("Unable to shift ipcache into new location: %s", err)
}
return nil
} | [
"func",
"shuffleMaps",
"(",
"realized",
",",
"backup",
",",
"pending",
"string",
")",
"error",
"{",
"realizedPath",
":=",
"bpf",
".",
"MapPath",
"(",
"realized",
")",
"\n",
"backupPath",
":=",
"bpf",
".",
"MapPath",
"(",
"backup",
")",
"\n",
"pendingPath",
":=",
"bpf",
".",
"MapPath",
"(",
"pending",
")",
"\n\n",
"if",
"err",
":=",
"os",
".",
"Rename",
"(",
"realizedPath",
",",
"backupPath",
")",
";",
"err",
"!=",
"nil",
"&&",
"!",
"os",
".",
"IsNotExist",
"(",
"err",
")",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"os",
".",
"Rename",
"(",
"pendingPath",
",",
"realizedPath",
")",
";",
"err",
"!=",
"nil",
"{",
"handleMapShuffleFailure",
"(",
"backup",
",",
"realized",
")",
"\n",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // shuffleMaps attempts to move the map with name 'realized' to 'backup' and
// 'pending' to 'realized'. If an error occurs, attempts to return the maps
// back to their original paths. | [
"shuffleMaps",
"attempts",
"to",
"move",
"the",
"map",
"with",
"name",
"realized",
"to",
"backup",
"and",
"pending",
"to",
"realized",
".",
"If",
"an",
"error",
"occurs",
"attempts",
"to",
"return",
"the",
"maps",
"back",
"to",
"their",
"original",
"paths",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/ipcache/listener.go#L169-L184 |
163,396 | cilium/cilium | pkg/datapath/ipcache/listener.go | OnIPIdentityCacheGC | func (l *BPFListener) OnIPIdentityCacheGC() {
// This controller ensures that the in-memory IP-identity cache is in-sync
// with the BPF map on disk. These can get out of sync if the cilium-agent
// is offline for some time, as the maps persist on the BPF filesystem.
// In the case that there is some loss of event history in the key-value
// store (e.g., compaction in etcd), we cannot rely upon the key-value store
// fully to give us the history of all events. As such, periodically check
// for inconsistencies in the data-path with that in the agent to ensure
// consistent state.
controller.NewManager().UpdateController("ipcache-bpf-garbage-collection",
controller.ControllerParams{
DoFunc: l.garbageCollect,
RunInterval: 5 * time.Minute,
},
)
} | go | func (l *BPFListener) OnIPIdentityCacheGC() {
// This controller ensures that the in-memory IP-identity cache is in-sync
// with the BPF map on disk. These can get out of sync if the cilium-agent
// is offline for some time, as the maps persist on the BPF filesystem.
// In the case that there is some loss of event history in the key-value
// store (e.g., compaction in etcd), we cannot rely upon the key-value store
// fully to give us the history of all events. As such, periodically check
// for inconsistencies in the data-path with that in the agent to ensure
// consistent state.
controller.NewManager().UpdateController("ipcache-bpf-garbage-collection",
controller.ControllerParams{
DoFunc: l.garbageCollect,
RunInterval: 5 * time.Minute,
},
)
} | [
"func",
"(",
"l",
"*",
"BPFListener",
")",
"OnIPIdentityCacheGC",
"(",
")",
"{",
"// This controller ensures that the in-memory IP-identity cache is in-sync",
"// with the BPF map on disk. These can get out of sync if the cilium-agent",
"// is offline for some time, as the maps persist on the BPF filesystem.",
"// In the case that there is some loss of event history in the key-value",
"// store (e.g., compaction in etcd), we cannot rely upon the key-value store",
"// fully to give us the history of all events. As such, periodically check",
"// for inconsistencies in the data-path with that in the agent to ensure",
"// consistent state.",
"controller",
".",
"NewManager",
"(",
")",
".",
"UpdateController",
"(",
"\"",
"\"",
",",
"controller",
".",
"ControllerParams",
"{",
"DoFunc",
":",
"l",
".",
"garbageCollect",
",",
"RunInterval",
":",
"5",
"*",
"time",
".",
"Minute",
",",
"}",
",",
")",
"\n",
"}"
] | // OnIPIdentityCacheGC spawns a controller which synchronizes the BPF IPCache Map
// with the in-memory IP-Identity cache. | [
"OnIPIdentityCacheGC",
"spawns",
"a",
"controller",
"which",
"synchronizes",
"the",
"BPF",
"IPCache",
"Map",
"with",
"the",
"in",
"-",
"memory",
"IP",
"-",
"Identity",
"cache",
"."
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/ipcache/listener.go#L265-L280 |
163,397 | cilium/cilium | api/v1/client/policy/delete_policy_parameters.go | WithTimeout | func (o *DeletePolicyParams) WithTimeout(timeout time.Duration) *DeletePolicyParams {
o.SetTimeout(timeout)
return o
} | go | func (o *DeletePolicyParams) WithTimeout(timeout time.Duration) *DeletePolicyParams {
o.SetTimeout(timeout)
return o
} | [
"func",
"(",
"o",
"*",
"DeletePolicyParams",
")",
"WithTimeout",
"(",
"timeout",
"time",
".",
"Duration",
")",
"*",
"DeletePolicyParams",
"{",
"o",
".",
"SetTimeout",
"(",
"timeout",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithTimeout adds the timeout to the delete policy params | [
"WithTimeout",
"adds",
"the",
"timeout",
"to",
"the",
"delete",
"policy",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/policy/delete_policy_parameters.go#L75-L78 |
163,398 | cilium/cilium | api/v1/client/policy/delete_policy_parameters.go | WithContext | func (o *DeletePolicyParams) WithContext(ctx context.Context) *DeletePolicyParams {
o.SetContext(ctx)
return o
} | go | func (o *DeletePolicyParams) WithContext(ctx context.Context) *DeletePolicyParams {
o.SetContext(ctx)
return o
} | [
"func",
"(",
"o",
"*",
"DeletePolicyParams",
")",
"WithContext",
"(",
"ctx",
"context",
".",
"Context",
")",
"*",
"DeletePolicyParams",
"{",
"o",
".",
"SetContext",
"(",
"ctx",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithContext adds the context to the delete policy params | [
"WithContext",
"adds",
"the",
"context",
"to",
"the",
"delete",
"policy",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/policy/delete_policy_parameters.go#L86-L89 |
163,399 | cilium/cilium | api/v1/client/policy/delete_policy_parameters.go | WithHTTPClient | func (o *DeletePolicyParams) WithHTTPClient(client *http.Client) *DeletePolicyParams {
o.SetHTTPClient(client)
return o
} | go | func (o *DeletePolicyParams) WithHTTPClient(client *http.Client) *DeletePolicyParams {
o.SetHTTPClient(client)
return o
} | [
"func",
"(",
"o",
"*",
"DeletePolicyParams",
")",
"WithHTTPClient",
"(",
"client",
"*",
"http",
".",
"Client",
")",
"*",
"DeletePolicyParams",
"{",
"o",
".",
"SetHTTPClient",
"(",
"client",
")",
"\n",
"return",
"o",
"\n",
"}"
] | // WithHTTPClient adds the HTTPClient to the delete policy params | [
"WithHTTPClient",
"adds",
"the",
"HTTPClient",
"to",
"the",
"delete",
"policy",
"params"
] | 6ecfff82c2314dd9d847645361b57e2646eed64b | https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/policy/delete_policy_parameters.go#L97-L100 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.