repo
stringlengths 5
54
| path
stringlengths 4
155
| func_name
stringlengths 1
118
| original_string
stringlengths 52
85.5k
| language
stringclasses 1
value | code
stringlengths 52
85.5k
| code_tokens
sequence | docstring
stringlengths 6
2.61k
| docstring_tokens
sequence | sha
stringlengths 40
40
| url
stringlengths 85
252
| partition
stringclasses 1
value |
---|---|---|---|---|---|---|---|---|---|---|---|
docker/libnetwork | controller.go | SandboxContainerWalker | func SandboxContainerWalker(out *Sandbox, containerID string) SandboxWalker {
return func(sb Sandbox) bool {
if sb.ContainerID() == containerID {
*out = sb
return true
}
return false
}
} | go | func SandboxContainerWalker(out *Sandbox, containerID string) SandboxWalker {
return func(sb Sandbox) bool {
if sb.ContainerID() == containerID {
*out = sb
return true
}
return false
}
} | [
"func",
"SandboxContainerWalker",
"(",
"out",
"*",
"Sandbox",
",",
"containerID",
"string",
")",
"SandboxWalker",
"{",
"return",
"func",
"(",
"sb",
"Sandbox",
")",
"bool",
"{",
"if",
"sb",
".",
"ContainerID",
"(",
")",
"==",
"containerID",
"{",
"*",
"out",
"=",
"sb",
"\n",
"return",
"true",
"\n",
"}",
"\n",
"return",
"false",
"\n",
"}",
"\n",
"}"
] | // SandboxContainerWalker returns a Sandbox Walker function which looks for an existing Sandbox with the passed containerID | [
"SandboxContainerWalker",
"returns",
"a",
"Sandbox",
"Walker",
"function",
"which",
"looks",
"for",
"an",
"existing",
"Sandbox",
"with",
"the",
"passed",
"containerID"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/controller.go#L1251-L1259 | train |
docker/libnetwork | controller.go | SandboxKeyWalker | func SandboxKeyWalker(out *Sandbox, key string) SandboxWalker {
return func(sb Sandbox) bool {
if sb.Key() == key {
*out = sb
return true
}
return false
}
} | go | func SandboxKeyWalker(out *Sandbox, key string) SandboxWalker {
return func(sb Sandbox) bool {
if sb.Key() == key {
*out = sb
return true
}
return false
}
} | [
"func",
"SandboxKeyWalker",
"(",
"out",
"*",
"Sandbox",
",",
"key",
"string",
")",
"SandboxWalker",
"{",
"return",
"func",
"(",
"sb",
"Sandbox",
")",
"bool",
"{",
"if",
"sb",
".",
"Key",
"(",
")",
"==",
"key",
"{",
"*",
"out",
"=",
"sb",
"\n",
"return",
"true",
"\n",
"}",
"\n",
"return",
"false",
"\n",
"}",
"\n",
"}"
] | // SandboxKeyWalker returns a Sandbox Walker function which looks for an existing Sandbox with the passed key | [
"SandboxKeyWalker",
"returns",
"a",
"Sandbox",
"Walker",
"function",
"which",
"looks",
"for",
"an",
"existing",
"Sandbox",
"with",
"the",
"passed",
"key"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/controller.go#L1262-L1270 | train |
docker/libnetwork | controller.go | StartDiagnostic | func (c *controller) StartDiagnostic(port int) {
c.Lock()
if !c.DiagnosticServer.IsDiagnosticEnabled() {
c.DiagnosticServer.EnableDiagnostic("127.0.0.1", port)
}
c.Unlock()
} | go | func (c *controller) StartDiagnostic(port int) {
c.Lock()
if !c.DiagnosticServer.IsDiagnosticEnabled() {
c.DiagnosticServer.EnableDiagnostic("127.0.0.1", port)
}
c.Unlock()
} | [
"func",
"(",
"c",
"*",
"controller",
")",
"StartDiagnostic",
"(",
"port",
"int",
")",
"{",
"c",
".",
"Lock",
"(",
")",
"\n",
"if",
"!",
"c",
".",
"DiagnosticServer",
".",
"IsDiagnosticEnabled",
"(",
")",
"{",
"c",
".",
"DiagnosticServer",
".",
"EnableDiagnostic",
"(",
"\"",
"\"",
",",
"port",
")",
"\n",
"}",
"\n",
"c",
".",
"Unlock",
"(",
")",
"\n",
"}"
] | // StartDiagnostic start the network dias mode | [
"StartDiagnostic",
"start",
"the",
"network",
"dias",
"mode"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/controller.go#L1335-L1341 | train |
docker/libnetwork | controller.go | StopDiagnostic | func (c *controller) StopDiagnostic() {
c.Lock()
if c.DiagnosticServer.IsDiagnosticEnabled() {
c.DiagnosticServer.DisableDiagnostic()
}
c.Unlock()
} | go | func (c *controller) StopDiagnostic() {
c.Lock()
if c.DiagnosticServer.IsDiagnosticEnabled() {
c.DiagnosticServer.DisableDiagnostic()
}
c.Unlock()
} | [
"func",
"(",
"c",
"*",
"controller",
")",
"StopDiagnostic",
"(",
")",
"{",
"c",
".",
"Lock",
"(",
")",
"\n",
"if",
"c",
".",
"DiagnosticServer",
".",
"IsDiagnosticEnabled",
"(",
")",
"{",
"c",
".",
"DiagnosticServer",
".",
"DisableDiagnostic",
"(",
")",
"\n",
"}",
"\n",
"c",
".",
"Unlock",
"(",
")",
"\n",
"}"
] | // StopDiagnostic start the network dias mode | [
"StopDiagnostic",
"start",
"the",
"network",
"dias",
"mode"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/controller.go#L1344-L1350 | train |
docker/libnetwork | controller.go | IsDiagnosticEnabled | func (c *controller) IsDiagnosticEnabled() bool {
c.Lock()
defer c.Unlock()
return c.DiagnosticServer.IsDiagnosticEnabled()
} | go | func (c *controller) IsDiagnosticEnabled() bool {
c.Lock()
defer c.Unlock()
return c.DiagnosticServer.IsDiagnosticEnabled()
} | [
"func",
"(",
"c",
"*",
"controller",
")",
"IsDiagnosticEnabled",
"(",
")",
"bool",
"{",
"c",
".",
"Lock",
"(",
")",
"\n",
"defer",
"c",
".",
"Unlock",
"(",
")",
"\n",
"return",
"c",
".",
"DiagnosticServer",
".",
"IsDiagnosticEnabled",
"(",
")",
"\n",
"}"
] | // IsDiagnosticEnabled returns true if the dias is enabled | [
"IsDiagnosticEnabled",
"returns",
"true",
"if",
"the",
"dias",
"is",
"enabled"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/controller.go#L1353-L1357 | train |
docker/libnetwork | drivers/overlay/ov_network.go | destroySandbox | func (n *network) destroySandbox() {
if n.sbox != nil {
for _, iface := range n.sbox.Info().Interfaces() {
if err := iface.Remove(); err != nil {
logrus.Debugf("Remove interface %s failed: %v", iface.SrcName(), err)
}
}
for _, s := range n.subnets {
if hostMode {
if err := removeFilters(n.id[:12], s.brName); err != nil {
logrus.Warnf("Could not remove overlay filters: %v", err)
}
}
if s.vxlanName != "" {
err := deleteInterface(s.vxlanName)
if err != nil {
logrus.Warnf("could not cleanup sandbox properly: %v", err)
}
}
}
if hostMode {
if err := removeNetworkChain(n.id[:12]); err != nil {
logrus.Warnf("could not remove network chain: %v", err)
}
}
// Close the netlink socket, this will also release the watchMiss goroutine that is using it
if n.nlSocket != nil {
n.nlSocket.Close()
n.nlSocket = nil
}
n.sbox.Destroy()
n.sbox = nil
}
} | go | func (n *network) destroySandbox() {
if n.sbox != nil {
for _, iface := range n.sbox.Info().Interfaces() {
if err := iface.Remove(); err != nil {
logrus.Debugf("Remove interface %s failed: %v", iface.SrcName(), err)
}
}
for _, s := range n.subnets {
if hostMode {
if err := removeFilters(n.id[:12], s.brName); err != nil {
logrus.Warnf("Could not remove overlay filters: %v", err)
}
}
if s.vxlanName != "" {
err := deleteInterface(s.vxlanName)
if err != nil {
logrus.Warnf("could not cleanup sandbox properly: %v", err)
}
}
}
if hostMode {
if err := removeNetworkChain(n.id[:12]); err != nil {
logrus.Warnf("could not remove network chain: %v", err)
}
}
// Close the netlink socket, this will also release the watchMiss goroutine that is using it
if n.nlSocket != nil {
n.nlSocket.Close()
n.nlSocket = nil
}
n.sbox.Destroy()
n.sbox = nil
}
} | [
"func",
"(",
"n",
"*",
"network",
")",
"destroySandbox",
"(",
")",
"{",
"if",
"n",
".",
"sbox",
"!=",
"nil",
"{",
"for",
"_",
",",
"iface",
":=",
"range",
"n",
".",
"sbox",
".",
"Info",
"(",
")",
".",
"Interfaces",
"(",
")",
"{",
"if",
"err",
":=",
"iface",
".",
"Remove",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"iface",
".",
"SrcName",
"(",
")",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"s",
":=",
"range",
"n",
".",
"subnets",
"{",
"if",
"hostMode",
"{",
"if",
"err",
":=",
"removeFilters",
"(",
"n",
".",
"id",
"[",
":",
"12",
"]",
",",
"s",
".",
"brName",
")",
";",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Warnf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"s",
".",
"vxlanName",
"!=",
"\"",
"\"",
"{",
"err",
":=",
"deleteInterface",
"(",
"s",
".",
"vxlanName",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Warnf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"hostMode",
"{",
"if",
"err",
":=",
"removeNetworkChain",
"(",
"n",
".",
"id",
"[",
":",
"12",
"]",
")",
";",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Warnf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"// Close the netlink socket, this will also release the watchMiss goroutine that is using it",
"if",
"n",
".",
"nlSocket",
"!=",
"nil",
"{",
"n",
".",
"nlSocket",
".",
"Close",
"(",
")",
"\n",
"n",
".",
"nlSocket",
"=",
"nil",
"\n",
"}",
"\n\n",
"n",
".",
"sbox",
".",
"Destroy",
"(",
")",
"\n",
"n",
".",
"sbox",
"=",
"nil",
"\n",
"}",
"\n",
"}"
] | // to be called while holding network lock | [
"to",
"be",
"called",
"while",
"holding",
"network",
"lock"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/overlay/ov_network.go#L374-L412 | train |
docker/libnetwork | drivers/overlay/ov_network.go | initSubnetSandbox | func (n *network) initSubnetSandbox(s *subnet, restore bool) error {
brName := n.generateBridgeName(s)
vxlanName := n.generateVxlanName(s)
if restore {
if err := n.restoreSubnetSandbox(s, brName, vxlanName); err != nil {
return err
}
} else {
if err := n.setupSubnetSandbox(s, brName, vxlanName); err != nil {
return err
}
}
s.vxlanName = vxlanName
s.brName = brName
return nil
} | go | func (n *network) initSubnetSandbox(s *subnet, restore bool) error {
brName := n.generateBridgeName(s)
vxlanName := n.generateVxlanName(s)
if restore {
if err := n.restoreSubnetSandbox(s, brName, vxlanName); err != nil {
return err
}
} else {
if err := n.setupSubnetSandbox(s, brName, vxlanName); err != nil {
return err
}
}
s.vxlanName = vxlanName
s.brName = brName
return nil
} | [
"func",
"(",
"n",
"*",
"network",
")",
"initSubnetSandbox",
"(",
"s",
"*",
"subnet",
",",
"restore",
"bool",
")",
"error",
"{",
"brName",
":=",
"n",
".",
"generateBridgeName",
"(",
"s",
")",
"\n",
"vxlanName",
":=",
"n",
".",
"generateVxlanName",
"(",
"s",
")",
"\n\n",
"if",
"restore",
"{",
"if",
"err",
":=",
"n",
".",
"restoreSubnetSandbox",
"(",
"s",
",",
"brName",
",",
"vxlanName",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"else",
"{",
"if",
"err",
":=",
"n",
".",
"setupSubnetSandbox",
"(",
"s",
",",
"brName",
",",
"vxlanName",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n\n",
"s",
".",
"vxlanName",
"=",
"vxlanName",
"\n",
"s",
".",
"brName",
"=",
"brName",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Must be called with the network lock | [
"Must",
"be",
"called",
"with",
"the",
"network",
"lock"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/overlay/ov_network.go#L662-L680 | train |
docker/libnetwork | drivers/overlay/ov_network.go | restoreNetworkFromStore | func (d *driver) restoreNetworkFromStore(nid string) *network {
n := d.getNetworkFromStore(nid)
if n != nil {
n.driver = d
n.endpoints = endpointTable{}
d.networks[nid] = n
}
return n
} | go | func (d *driver) restoreNetworkFromStore(nid string) *network {
n := d.getNetworkFromStore(nid)
if n != nil {
n.driver = d
n.endpoints = endpointTable{}
d.networks[nid] = n
}
return n
} | [
"func",
"(",
"d",
"*",
"driver",
")",
"restoreNetworkFromStore",
"(",
"nid",
"string",
")",
"*",
"network",
"{",
"n",
":=",
"d",
".",
"getNetworkFromStore",
"(",
"nid",
")",
"\n",
"if",
"n",
"!=",
"nil",
"{",
"n",
".",
"driver",
"=",
"d",
"\n",
"n",
".",
"endpoints",
"=",
"endpointTable",
"{",
"}",
"\n",
"d",
".",
"networks",
"[",
"nid",
"]",
"=",
"n",
"\n",
"}",
"\n",
"return",
"n",
"\n",
"}"
] | // Restore a network from the store to the driver if it is present.
// Must be called with the driver locked! | [
"Restore",
"a",
"network",
"from",
"the",
"store",
"to",
"the",
"driver",
"if",
"it",
"is",
"present",
".",
"Must",
"be",
"called",
"with",
"the",
"driver",
"locked!"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/overlay/ov_network.go#L863-L871 | train |
docker/libnetwork | drivers/ipvlan/ipvlan_network.go | createNetwork | func (d *driver) createNetwork(config *configuration) error {
networkList := d.getNetworks()
for _, nw := range networkList {
if config.Parent == nw.config.Parent {
return fmt.Errorf("network %s is already using parent interface %s",
getDummyName(stringid.TruncateID(nw.config.ID)), config.Parent)
}
}
if !parentExists(config.Parent) {
// if the --internal flag is set, create a dummy link
if config.Internal {
err := createDummyLink(config.Parent, getDummyName(stringid.TruncateID(config.ID)))
if err != nil {
return err
}
config.CreatedSlaveLink = true
// notify the user in logs they have limited communications
if config.Parent == getDummyName(stringid.TruncateID(config.ID)) {
logrus.Debugf("Empty -o parent= and --internal flags limit communications to other containers inside of network: %s",
config.Parent)
}
} else {
// if the subinterface parent_iface.vlan_id checks do not pass, return err.
// a valid example is 'eth0.10' for a parent iface 'eth0' with a vlan id '10'
err := createVlanLink(config.Parent)
if err != nil {
return err
}
// if driver created the networks slave link, record it for future deletion
config.CreatedSlaveLink = true
}
}
n := &network{
id: config.ID,
driver: d,
endpoints: endpointTable{},
config: config,
}
// add the *network
d.addNetwork(n)
return nil
} | go | func (d *driver) createNetwork(config *configuration) error {
networkList := d.getNetworks()
for _, nw := range networkList {
if config.Parent == nw.config.Parent {
return fmt.Errorf("network %s is already using parent interface %s",
getDummyName(stringid.TruncateID(nw.config.ID)), config.Parent)
}
}
if !parentExists(config.Parent) {
// if the --internal flag is set, create a dummy link
if config.Internal {
err := createDummyLink(config.Parent, getDummyName(stringid.TruncateID(config.ID)))
if err != nil {
return err
}
config.CreatedSlaveLink = true
// notify the user in logs they have limited communications
if config.Parent == getDummyName(stringid.TruncateID(config.ID)) {
logrus.Debugf("Empty -o parent= and --internal flags limit communications to other containers inside of network: %s",
config.Parent)
}
} else {
// if the subinterface parent_iface.vlan_id checks do not pass, return err.
// a valid example is 'eth0.10' for a parent iface 'eth0' with a vlan id '10'
err := createVlanLink(config.Parent)
if err != nil {
return err
}
// if driver created the networks slave link, record it for future deletion
config.CreatedSlaveLink = true
}
}
n := &network{
id: config.ID,
driver: d,
endpoints: endpointTable{},
config: config,
}
// add the *network
d.addNetwork(n)
return nil
} | [
"func",
"(",
"d",
"*",
"driver",
")",
"createNetwork",
"(",
"config",
"*",
"configuration",
")",
"error",
"{",
"networkList",
":=",
"d",
".",
"getNetworks",
"(",
")",
"\n",
"for",
"_",
",",
"nw",
":=",
"range",
"networkList",
"{",
"if",
"config",
".",
"Parent",
"==",
"nw",
".",
"config",
".",
"Parent",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"getDummyName",
"(",
"stringid",
".",
"TruncateID",
"(",
"nw",
".",
"config",
".",
"ID",
")",
")",
",",
"config",
".",
"Parent",
")",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"!",
"parentExists",
"(",
"config",
".",
"Parent",
")",
"{",
"// if the --internal flag is set, create a dummy link",
"if",
"config",
".",
"Internal",
"{",
"err",
":=",
"createDummyLink",
"(",
"config",
".",
"Parent",
",",
"getDummyName",
"(",
"stringid",
".",
"TruncateID",
"(",
"config",
".",
"ID",
")",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"config",
".",
"CreatedSlaveLink",
"=",
"true",
"\n",
"// notify the user in logs they have limited communications",
"if",
"config",
".",
"Parent",
"==",
"getDummyName",
"(",
"stringid",
".",
"TruncateID",
"(",
"config",
".",
"ID",
")",
")",
"{",
"logrus",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"config",
".",
"Parent",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"// if the subinterface parent_iface.vlan_id checks do not pass, return err.",
"// a valid example is 'eth0.10' for a parent iface 'eth0' with a vlan id '10'",
"err",
":=",
"createVlanLink",
"(",
"config",
".",
"Parent",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"// if driver created the networks slave link, record it for future deletion",
"config",
".",
"CreatedSlaveLink",
"=",
"true",
"\n",
"}",
"\n",
"}",
"\n",
"n",
":=",
"&",
"network",
"{",
"id",
":",
"config",
".",
"ID",
",",
"driver",
":",
"d",
",",
"endpoints",
":",
"endpointTable",
"{",
"}",
",",
"config",
":",
"config",
",",
"}",
"\n",
"// add the *network",
"d",
".",
"addNetwork",
"(",
"n",
")",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // createNetwork is used by new network callbacks and persistent network cache | [
"createNetwork",
"is",
"used",
"by",
"new",
"network",
"callbacks",
"and",
"persistent",
"network",
"cache"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/ipvlan/ipvlan_network.go#L79-L121 | train |
docker/libnetwork | drivers/ipvlan/ipvlan_network.go | DeleteNetwork | func (d *driver) DeleteNetwork(nid string) error {
defer osl.InitOSContext()()
n := d.network(nid)
if n == nil {
return fmt.Errorf("network id %s not found", nid)
}
// if the driver created the slave interface, delete it, otherwise leave it
if ok := n.config.CreatedSlaveLink; ok {
// if the interface exists, only delete if it matches iface.vlan or dummy.net_id naming
if ok := parentExists(n.config.Parent); ok {
// only delete the link if it is named the net_id
if n.config.Parent == getDummyName(stringid.TruncateID(nid)) {
err := delDummyLink(n.config.Parent)
if err != nil {
logrus.Debugf("link %s was not deleted, continuing the delete network operation: %v",
n.config.Parent, err)
}
} else {
// only delete the link if it matches iface.vlan naming
err := delVlanLink(n.config.Parent)
if err != nil {
logrus.Debugf("link %s was not deleted, continuing the delete network operation: %v",
n.config.Parent, err)
}
}
}
}
for _, ep := range n.endpoints {
if link, err := ns.NlHandle().LinkByName(ep.srcName); err == nil {
if err := ns.NlHandle().LinkDel(link); err != nil {
logrus.WithError(err).Warnf("Failed to delete interface (%s)'s link on endpoint (%s) delete", ep.srcName, ep.id)
}
}
if err := d.storeDelete(ep); err != nil {
logrus.Warnf("Failed to remove ipvlan endpoint %.7s from store: %v", ep.id, err)
}
}
// delete the *network
d.deleteNetwork(nid)
// delete the network record from persistent cache
err := d.storeDelete(n.config)
if err != nil {
return fmt.Errorf("error deleting deleting id %s from datastore: %v", nid, err)
}
return nil
} | go | func (d *driver) DeleteNetwork(nid string) error {
defer osl.InitOSContext()()
n := d.network(nid)
if n == nil {
return fmt.Errorf("network id %s not found", nid)
}
// if the driver created the slave interface, delete it, otherwise leave it
if ok := n.config.CreatedSlaveLink; ok {
// if the interface exists, only delete if it matches iface.vlan or dummy.net_id naming
if ok := parentExists(n.config.Parent); ok {
// only delete the link if it is named the net_id
if n.config.Parent == getDummyName(stringid.TruncateID(nid)) {
err := delDummyLink(n.config.Parent)
if err != nil {
logrus.Debugf("link %s was not deleted, continuing the delete network operation: %v",
n.config.Parent, err)
}
} else {
// only delete the link if it matches iface.vlan naming
err := delVlanLink(n.config.Parent)
if err != nil {
logrus.Debugf("link %s was not deleted, continuing the delete network operation: %v",
n.config.Parent, err)
}
}
}
}
for _, ep := range n.endpoints {
if link, err := ns.NlHandle().LinkByName(ep.srcName); err == nil {
if err := ns.NlHandle().LinkDel(link); err != nil {
logrus.WithError(err).Warnf("Failed to delete interface (%s)'s link on endpoint (%s) delete", ep.srcName, ep.id)
}
}
if err := d.storeDelete(ep); err != nil {
logrus.Warnf("Failed to remove ipvlan endpoint %.7s from store: %v", ep.id, err)
}
}
// delete the *network
d.deleteNetwork(nid)
// delete the network record from persistent cache
err := d.storeDelete(n.config)
if err != nil {
return fmt.Errorf("error deleting deleting id %s from datastore: %v", nid, err)
}
return nil
} | [
"func",
"(",
"d",
"*",
"driver",
")",
"DeleteNetwork",
"(",
"nid",
"string",
")",
"error",
"{",
"defer",
"osl",
".",
"InitOSContext",
"(",
")",
"(",
")",
"\n",
"n",
":=",
"d",
".",
"network",
"(",
"nid",
")",
"\n",
"if",
"n",
"==",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"nid",
")",
"\n",
"}",
"\n",
"// if the driver created the slave interface, delete it, otherwise leave it",
"if",
"ok",
":=",
"n",
".",
"config",
".",
"CreatedSlaveLink",
";",
"ok",
"{",
"// if the interface exists, only delete if it matches iface.vlan or dummy.net_id naming",
"if",
"ok",
":=",
"parentExists",
"(",
"n",
".",
"config",
".",
"Parent",
")",
";",
"ok",
"{",
"// only delete the link if it is named the net_id",
"if",
"n",
".",
"config",
".",
"Parent",
"==",
"getDummyName",
"(",
"stringid",
".",
"TruncateID",
"(",
"nid",
")",
")",
"{",
"err",
":=",
"delDummyLink",
"(",
"n",
".",
"config",
".",
"Parent",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"n",
".",
"config",
".",
"Parent",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"// only delete the link if it matches iface.vlan naming",
"err",
":=",
"delVlanLink",
"(",
"n",
".",
"config",
".",
"Parent",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"n",
".",
"config",
".",
"Parent",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"for",
"_",
",",
"ep",
":=",
"range",
"n",
".",
"endpoints",
"{",
"if",
"link",
",",
"err",
":=",
"ns",
".",
"NlHandle",
"(",
")",
".",
"LinkByName",
"(",
"ep",
".",
"srcName",
")",
";",
"err",
"==",
"nil",
"{",
"if",
"err",
":=",
"ns",
".",
"NlHandle",
"(",
")",
".",
"LinkDel",
"(",
"link",
")",
";",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"WithError",
"(",
"err",
")",
".",
"Warnf",
"(",
"\"",
"\"",
",",
"ep",
".",
"srcName",
",",
"ep",
".",
"id",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"d",
".",
"storeDelete",
"(",
"ep",
")",
";",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Warnf",
"(",
"\"",
"\"",
",",
"ep",
".",
"id",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"// delete the *network",
"d",
".",
"deleteNetwork",
"(",
"nid",
")",
"\n",
"// delete the network record from persistent cache",
"err",
":=",
"d",
".",
"storeDelete",
"(",
"n",
".",
"config",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"nid",
",",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // DeleteNetwork the network for the specified driver type | [
"DeleteNetwork",
"the",
"network",
"for",
"the",
"specified",
"driver",
"type"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/ipvlan/ipvlan_network.go#L124-L170 | train |
docker/libnetwork | drivers/ipvlan/ipvlan_network.go | parseNetworkOptions | func parseNetworkOptions(id string, option options.Generic) (*configuration, error) {
var (
err error
config = &configuration{}
)
// parse generic labels first
if genData, ok := option[netlabel.GenericData]; ok && genData != nil {
if config, err = parseNetworkGenericOptions(genData); err != nil {
return nil, err
}
}
// setting the parent to "" will trigger an isolated network dummy parent link
if _, ok := option[netlabel.Internal]; ok {
config.Internal = true
// empty --parent= and --internal are handled the same.
config.Parent = ""
}
return config, nil
} | go | func parseNetworkOptions(id string, option options.Generic) (*configuration, error) {
var (
err error
config = &configuration{}
)
// parse generic labels first
if genData, ok := option[netlabel.GenericData]; ok && genData != nil {
if config, err = parseNetworkGenericOptions(genData); err != nil {
return nil, err
}
}
// setting the parent to "" will trigger an isolated network dummy parent link
if _, ok := option[netlabel.Internal]; ok {
config.Internal = true
// empty --parent= and --internal are handled the same.
config.Parent = ""
}
return config, nil
} | [
"func",
"parseNetworkOptions",
"(",
"id",
"string",
",",
"option",
"options",
".",
"Generic",
")",
"(",
"*",
"configuration",
",",
"error",
")",
"{",
"var",
"(",
"err",
"error",
"\n",
"config",
"=",
"&",
"configuration",
"{",
"}",
"\n",
")",
"\n",
"// parse generic labels first",
"if",
"genData",
",",
"ok",
":=",
"option",
"[",
"netlabel",
".",
"GenericData",
"]",
";",
"ok",
"&&",
"genData",
"!=",
"nil",
"{",
"if",
"config",
",",
"err",
"=",
"parseNetworkGenericOptions",
"(",
"genData",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"// setting the parent to \"\" will trigger an isolated network dummy parent link",
"if",
"_",
",",
"ok",
":=",
"option",
"[",
"netlabel",
".",
"Internal",
"]",
";",
"ok",
"{",
"config",
".",
"Internal",
"=",
"true",
"\n",
"// empty --parent= and --internal are handled the same.",
"config",
".",
"Parent",
"=",
"\"",
"\"",
"\n",
"}",
"\n",
"return",
"config",
",",
"nil",
"\n",
"}"
] | // parseNetworkOptions parse docker network options | [
"parseNetworkOptions",
"parse",
"docker",
"network",
"options"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/ipvlan/ipvlan_network.go#L173-L191 | train |
docker/libnetwork | drivers/ipvlan/ipvlan_network.go | parseNetworkGenericOptions | func parseNetworkGenericOptions(data interface{}) (*configuration, error) {
var (
err error
config *configuration
)
switch opt := data.(type) {
case *configuration:
config = opt
case map[string]string:
config = &configuration{}
err = config.fromOptions(opt)
case options.Generic:
var opaqueConfig interface{}
if opaqueConfig, err = options.GenerateFromModel(opt, config); err == nil {
config = opaqueConfig.(*configuration)
}
default:
err = types.BadRequestErrorf("unrecognized network configuration format: %v", opt)
}
return config, err
} | go | func parseNetworkGenericOptions(data interface{}) (*configuration, error) {
var (
err error
config *configuration
)
switch opt := data.(type) {
case *configuration:
config = opt
case map[string]string:
config = &configuration{}
err = config.fromOptions(opt)
case options.Generic:
var opaqueConfig interface{}
if opaqueConfig, err = options.GenerateFromModel(opt, config); err == nil {
config = opaqueConfig.(*configuration)
}
default:
err = types.BadRequestErrorf("unrecognized network configuration format: %v", opt)
}
return config, err
} | [
"func",
"parseNetworkGenericOptions",
"(",
"data",
"interface",
"{",
"}",
")",
"(",
"*",
"configuration",
",",
"error",
")",
"{",
"var",
"(",
"err",
"error",
"\n",
"config",
"*",
"configuration",
"\n",
")",
"\n",
"switch",
"opt",
":=",
"data",
".",
"(",
"type",
")",
"{",
"case",
"*",
"configuration",
":",
"config",
"=",
"opt",
"\n",
"case",
"map",
"[",
"string",
"]",
"string",
":",
"config",
"=",
"&",
"configuration",
"{",
"}",
"\n",
"err",
"=",
"config",
".",
"fromOptions",
"(",
"opt",
")",
"\n",
"case",
"options",
".",
"Generic",
":",
"var",
"opaqueConfig",
"interface",
"{",
"}",
"\n",
"if",
"opaqueConfig",
",",
"err",
"=",
"options",
".",
"GenerateFromModel",
"(",
"opt",
",",
"config",
")",
";",
"err",
"==",
"nil",
"{",
"config",
"=",
"opaqueConfig",
".",
"(",
"*",
"configuration",
")",
"\n",
"}",
"\n",
"default",
":",
"err",
"=",
"types",
".",
"BadRequestErrorf",
"(",
"\"",
"\"",
",",
"opt",
")",
"\n",
"}",
"\n",
"return",
"config",
",",
"err",
"\n",
"}"
] | // parseNetworkGenericOptions parse generic driver docker network options | [
"parseNetworkGenericOptions",
"parse",
"generic",
"driver",
"docker",
"network",
"options"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/ipvlan/ipvlan_network.go#L194-L214 | train |
docker/libnetwork | drivers/ipvlan/ipvlan_network.go | fromOptions | func (config *configuration) fromOptions(labels map[string]string) error {
for label, value := range labels {
switch label {
case parentOpt:
// parse driver option '-o parent'
config.Parent = value
case driverModeOpt:
// parse driver option '-o ipvlan_mode'
config.IpvlanMode = value
}
}
return nil
} | go | func (config *configuration) fromOptions(labels map[string]string) error {
for label, value := range labels {
switch label {
case parentOpt:
// parse driver option '-o parent'
config.Parent = value
case driverModeOpt:
// parse driver option '-o ipvlan_mode'
config.IpvlanMode = value
}
}
return nil
} | [
"func",
"(",
"config",
"*",
"configuration",
")",
"fromOptions",
"(",
"labels",
"map",
"[",
"string",
"]",
"string",
")",
"error",
"{",
"for",
"label",
",",
"value",
":=",
"range",
"labels",
"{",
"switch",
"label",
"{",
"case",
"parentOpt",
":",
"// parse driver option '-o parent'",
"config",
".",
"Parent",
"=",
"value",
"\n",
"case",
"driverModeOpt",
":",
"// parse driver option '-o ipvlan_mode'",
"config",
".",
"IpvlanMode",
"=",
"value",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // fromOptions binds the generic options to networkConfiguration to cache | [
"fromOptions",
"binds",
"the",
"generic",
"options",
"to",
"networkConfiguration",
"to",
"cache"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/ipvlan/ipvlan_network.go#L217-L229 | train |
docker/libnetwork | drivers/ipvlan/ipvlan_network.go | processIPAM | func (config *configuration) processIPAM(id string, ipamV4Data, ipamV6Data []driverapi.IPAMData) error {
if len(ipamV4Data) > 0 {
for _, ipd := range ipamV4Data {
s := &ipv4Subnet{
SubnetIP: ipd.Pool.String(),
GwIP: ipd.Gateway.String(),
}
config.Ipv4Subnets = append(config.Ipv4Subnets, s)
}
}
if len(ipamV6Data) > 0 {
for _, ipd := range ipamV6Data {
s := &ipv6Subnet{
SubnetIP: ipd.Pool.String(),
GwIP: ipd.Gateway.String(),
}
config.Ipv6Subnets = append(config.Ipv6Subnets, s)
}
}
return nil
} | go | func (config *configuration) processIPAM(id string, ipamV4Data, ipamV6Data []driverapi.IPAMData) error {
if len(ipamV4Data) > 0 {
for _, ipd := range ipamV4Data {
s := &ipv4Subnet{
SubnetIP: ipd.Pool.String(),
GwIP: ipd.Gateway.String(),
}
config.Ipv4Subnets = append(config.Ipv4Subnets, s)
}
}
if len(ipamV6Data) > 0 {
for _, ipd := range ipamV6Data {
s := &ipv6Subnet{
SubnetIP: ipd.Pool.String(),
GwIP: ipd.Gateway.String(),
}
config.Ipv6Subnets = append(config.Ipv6Subnets, s)
}
}
return nil
} | [
"func",
"(",
"config",
"*",
"configuration",
")",
"processIPAM",
"(",
"id",
"string",
",",
"ipamV4Data",
",",
"ipamV6Data",
"[",
"]",
"driverapi",
".",
"IPAMData",
")",
"error",
"{",
"if",
"len",
"(",
"ipamV4Data",
")",
">",
"0",
"{",
"for",
"_",
",",
"ipd",
":=",
"range",
"ipamV4Data",
"{",
"s",
":=",
"&",
"ipv4Subnet",
"{",
"SubnetIP",
":",
"ipd",
".",
"Pool",
".",
"String",
"(",
")",
",",
"GwIP",
":",
"ipd",
".",
"Gateway",
".",
"String",
"(",
")",
",",
"}",
"\n",
"config",
".",
"Ipv4Subnets",
"=",
"append",
"(",
"config",
".",
"Ipv4Subnets",
",",
"s",
")",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"len",
"(",
"ipamV6Data",
")",
">",
"0",
"{",
"for",
"_",
",",
"ipd",
":=",
"range",
"ipamV6Data",
"{",
"s",
":=",
"&",
"ipv6Subnet",
"{",
"SubnetIP",
":",
"ipd",
".",
"Pool",
".",
"String",
"(",
")",
",",
"GwIP",
":",
"ipd",
".",
"Gateway",
".",
"String",
"(",
")",
",",
"}",
"\n",
"config",
".",
"Ipv6Subnets",
"=",
"append",
"(",
"config",
".",
"Ipv6Subnets",
",",
"s",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // processIPAM parses v4 and v6 IP information and binds it to the network configuration | [
"processIPAM",
"parses",
"v4",
"and",
"v6",
"IP",
"information",
"and",
"binds",
"it",
"to",
"the",
"network",
"configuration"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/ipvlan/ipvlan_network.go#L232-L252 | train |
docker/libnetwork | hostdiscovery/hostdiscovery.go | NewHostDiscovery | func NewHostDiscovery(watcher discovery.Watcher) HostDiscovery {
return &hostDiscovery{watcher: watcher, nodes: mapset.NewSet(), stopChan: make(chan struct{})}
} | go | func NewHostDiscovery(watcher discovery.Watcher) HostDiscovery {
return &hostDiscovery{watcher: watcher, nodes: mapset.NewSet(), stopChan: make(chan struct{})}
} | [
"func",
"NewHostDiscovery",
"(",
"watcher",
"discovery",
".",
"Watcher",
")",
"HostDiscovery",
"{",
"return",
"&",
"hostDiscovery",
"{",
"watcher",
":",
"watcher",
",",
"nodes",
":",
"mapset",
".",
"NewSet",
"(",
")",
",",
"stopChan",
":",
"make",
"(",
"chan",
"struct",
"{",
"}",
")",
"}",
"\n",
"}"
] | // NewHostDiscovery function creates a host discovery object | [
"NewHostDiscovery",
"function",
"creates",
"a",
"host",
"discovery",
"object"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/hostdiscovery/hostdiscovery.go#L33-L35 | train |
docker/libnetwork | driverapi/ipamdata.go | MarshalJSON | func (i *IPAMData) MarshalJSON() ([]byte, error) {
m := map[string]interface{}{}
m["AddressSpace"] = i.AddressSpace
if i.Pool != nil {
m["Pool"] = i.Pool.String()
}
if i.Gateway != nil {
m["Gateway"] = i.Gateway.String()
}
if i.AuxAddresses != nil {
am := make(map[string]string, len(i.AuxAddresses))
for k, v := range i.AuxAddresses {
am[k] = v.String()
}
m["AuxAddresses"] = am
}
return json.Marshal(m)
} | go | func (i *IPAMData) MarshalJSON() ([]byte, error) {
m := map[string]interface{}{}
m["AddressSpace"] = i.AddressSpace
if i.Pool != nil {
m["Pool"] = i.Pool.String()
}
if i.Gateway != nil {
m["Gateway"] = i.Gateway.String()
}
if i.AuxAddresses != nil {
am := make(map[string]string, len(i.AuxAddresses))
for k, v := range i.AuxAddresses {
am[k] = v.String()
}
m["AuxAddresses"] = am
}
return json.Marshal(m)
} | [
"func",
"(",
"i",
"*",
"IPAMData",
")",
"MarshalJSON",
"(",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"m",
":=",
"map",
"[",
"string",
"]",
"interface",
"{",
"}",
"{",
"}",
"\n",
"m",
"[",
"\"",
"\"",
"]",
"=",
"i",
".",
"AddressSpace",
"\n",
"if",
"i",
".",
"Pool",
"!=",
"nil",
"{",
"m",
"[",
"\"",
"\"",
"]",
"=",
"i",
".",
"Pool",
".",
"String",
"(",
")",
"\n",
"}",
"\n",
"if",
"i",
".",
"Gateway",
"!=",
"nil",
"{",
"m",
"[",
"\"",
"\"",
"]",
"=",
"i",
".",
"Gateway",
".",
"String",
"(",
")",
"\n",
"}",
"\n",
"if",
"i",
".",
"AuxAddresses",
"!=",
"nil",
"{",
"am",
":=",
"make",
"(",
"map",
"[",
"string",
"]",
"string",
",",
"len",
"(",
"i",
".",
"AuxAddresses",
")",
")",
"\n",
"for",
"k",
",",
"v",
":=",
"range",
"i",
".",
"AuxAddresses",
"{",
"am",
"[",
"k",
"]",
"=",
"v",
".",
"String",
"(",
")",
"\n",
"}",
"\n",
"m",
"[",
"\"",
"\"",
"]",
"=",
"am",
"\n",
"}",
"\n",
"return",
"json",
".",
"Marshal",
"(",
"m",
")",
"\n",
"}"
] | // MarshalJSON encodes IPAMData into json message | [
"MarshalJSON",
"encodes",
"IPAMData",
"into",
"json",
"message"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/driverapi/ipamdata.go#L12-L29 | train |
docker/libnetwork | driverapi/ipamdata.go | UnmarshalJSON | func (i *IPAMData) UnmarshalJSON(data []byte) error {
var (
m map[string]interface{}
err error
)
if err := json.Unmarshal(data, &m); err != nil {
return err
}
i.AddressSpace = m["AddressSpace"].(string)
if v, ok := m["Pool"]; ok {
if i.Pool, err = types.ParseCIDR(v.(string)); err != nil {
return err
}
}
if v, ok := m["Gateway"]; ok {
if i.Gateway, err = types.ParseCIDR(v.(string)); err != nil {
return err
}
}
if v, ok := m["AuxAddresses"]; ok {
b, _ := json.Marshal(v)
var am map[string]string
if err = json.Unmarshal(b, &am); err != nil {
return err
}
i.AuxAddresses = make(map[string]*net.IPNet, len(am))
for k, v := range am {
if i.AuxAddresses[k], err = types.ParseCIDR(v); err != nil {
return err
}
}
}
return nil
} | go | func (i *IPAMData) UnmarshalJSON(data []byte) error {
var (
m map[string]interface{}
err error
)
if err := json.Unmarshal(data, &m); err != nil {
return err
}
i.AddressSpace = m["AddressSpace"].(string)
if v, ok := m["Pool"]; ok {
if i.Pool, err = types.ParseCIDR(v.(string)); err != nil {
return err
}
}
if v, ok := m["Gateway"]; ok {
if i.Gateway, err = types.ParseCIDR(v.(string)); err != nil {
return err
}
}
if v, ok := m["AuxAddresses"]; ok {
b, _ := json.Marshal(v)
var am map[string]string
if err = json.Unmarshal(b, &am); err != nil {
return err
}
i.AuxAddresses = make(map[string]*net.IPNet, len(am))
for k, v := range am {
if i.AuxAddresses[k], err = types.ParseCIDR(v); err != nil {
return err
}
}
}
return nil
} | [
"func",
"(",
"i",
"*",
"IPAMData",
")",
"UnmarshalJSON",
"(",
"data",
"[",
"]",
"byte",
")",
"error",
"{",
"var",
"(",
"m",
"map",
"[",
"string",
"]",
"interface",
"{",
"}",
"\n",
"err",
"error",
"\n",
")",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"data",
",",
"&",
"m",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"i",
".",
"AddressSpace",
"=",
"m",
"[",
"\"",
"\"",
"]",
".",
"(",
"string",
")",
"\n",
"if",
"v",
",",
"ok",
":=",
"m",
"[",
"\"",
"\"",
"]",
";",
"ok",
"{",
"if",
"i",
".",
"Pool",
",",
"err",
"=",
"types",
".",
"ParseCIDR",
"(",
"v",
".",
"(",
"string",
")",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"v",
",",
"ok",
":=",
"m",
"[",
"\"",
"\"",
"]",
";",
"ok",
"{",
"if",
"i",
".",
"Gateway",
",",
"err",
"=",
"types",
".",
"ParseCIDR",
"(",
"v",
".",
"(",
"string",
")",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"v",
",",
"ok",
":=",
"m",
"[",
"\"",
"\"",
"]",
";",
"ok",
"{",
"b",
",",
"_",
":=",
"json",
".",
"Marshal",
"(",
"v",
")",
"\n",
"var",
"am",
"map",
"[",
"string",
"]",
"string",
"\n",
"if",
"err",
"=",
"json",
".",
"Unmarshal",
"(",
"b",
",",
"&",
"am",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"i",
".",
"AuxAddresses",
"=",
"make",
"(",
"map",
"[",
"string",
"]",
"*",
"net",
".",
"IPNet",
",",
"len",
"(",
"am",
")",
")",
"\n",
"for",
"k",
",",
"v",
":=",
"range",
"am",
"{",
"if",
"i",
".",
"AuxAddresses",
"[",
"k",
"]",
",",
"err",
"=",
"types",
".",
"ParseCIDR",
"(",
"v",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // UnmarshalJSON decodes a json message into IPAMData | [
"UnmarshalJSON",
"decodes",
"a",
"json",
"message",
"into",
"IPAMData"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/driverapi/ipamdata.go#L32-L65 | train |
docker/libnetwork | driverapi/ipamdata.go | Validate | func (i *IPAMData) Validate() error {
var isV6 bool
if i.Pool == nil {
return types.BadRequestErrorf("invalid pool")
}
if i.Gateway == nil {
return types.BadRequestErrorf("invalid gateway address")
}
isV6 = i.IsV6()
if isV6 && i.Gateway.IP.To4() != nil || !isV6 && i.Gateway.IP.To4() == nil {
return types.BadRequestErrorf("incongruent ip versions for pool and gateway")
}
for k, sip := range i.AuxAddresses {
if isV6 && sip.IP.To4() != nil || !isV6 && sip.IP.To4() == nil {
return types.BadRequestErrorf("incongruent ip versions for pool and secondary ip address %s", k)
}
}
if !i.Pool.Contains(i.Gateway.IP) {
return types.BadRequestErrorf("invalid gateway address (%s) does not belong to the pool (%s)", i.Gateway, i.Pool)
}
for k, sip := range i.AuxAddresses {
if !i.Pool.Contains(sip.IP) {
return types.BadRequestErrorf("invalid secondary address %s (%s) does not belong to the pool (%s)", k, i.Gateway, i.Pool)
}
}
return nil
} | go | func (i *IPAMData) Validate() error {
var isV6 bool
if i.Pool == nil {
return types.BadRequestErrorf("invalid pool")
}
if i.Gateway == nil {
return types.BadRequestErrorf("invalid gateway address")
}
isV6 = i.IsV6()
if isV6 && i.Gateway.IP.To4() != nil || !isV6 && i.Gateway.IP.To4() == nil {
return types.BadRequestErrorf("incongruent ip versions for pool and gateway")
}
for k, sip := range i.AuxAddresses {
if isV6 && sip.IP.To4() != nil || !isV6 && sip.IP.To4() == nil {
return types.BadRequestErrorf("incongruent ip versions for pool and secondary ip address %s", k)
}
}
if !i.Pool.Contains(i.Gateway.IP) {
return types.BadRequestErrorf("invalid gateway address (%s) does not belong to the pool (%s)", i.Gateway, i.Pool)
}
for k, sip := range i.AuxAddresses {
if !i.Pool.Contains(sip.IP) {
return types.BadRequestErrorf("invalid secondary address %s (%s) does not belong to the pool (%s)", k, i.Gateway, i.Pool)
}
}
return nil
} | [
"func",
"(",
"i",
"*",
"IPAMData",
")",
"Validate",
"(",
")",
"error",
"{",
"var",
"isV6",
"bool",
"\n",
"if",
"i",
".",
"Pool",
"==",
"nil",
"{",
"return",
"types",
".",
"BadRequestErrorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"i",
".",
"Gateway",
"==",
"nil",
"{",
"return",
"types",
".",
"BadRequestErrorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"isV6",
"=",
"i",
".",
"IsV6",
"(",
")",
"\n",
"if",
"isV6",
"&&",
"i",
".",
"Gateway",
".",
"IP",
".",
"To4",
"(",
")",
"!=",
"nil",
"||",
"!",
"isV6",
"&&",
"i",
".",
"Gateway",
".",
"IP",
".",
"To4",
"(",
")",
"==",
"nil",
"{",
"return",
"types",
".",
"BadRequestErrorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"for",
"k",
",",
"sip",
":=",
"range",
"i",
".",
"AuxAddresses",
"{",
"if",
"isV6",
"&&",
"sip",
".",
"IP",
".",
"To4",
"(",
")",
"!=",
"nil",
"||",
"!",
"isV6",
"&&",
"sip",
".",
"IP",
".",
"To4",
"(",
")",
"==",
"nil",
"{",
"return",
"types",
".",
"BadRequestErrorf",
"(",
"\"",
"\"",
",",
"k",
")",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"!",
"i",
".",
"Pool",
".",
"Contains",
"(",
"i",
".",
"Gateway",
".",
"IP",
")",
"{",
"return",
"types",
".",
"BadRequestErrorf",
"(",
"\"",
"\"",
",",
"i",
".",
"Gateway",
",",
"i",
".",
"Pool",
")",
"\n",
"}",
"\n",
"for",
"k",
",",
"sip",
":=",
"range",
"i",
".",
"AuxAddresses",
"{",
"if",
"!",
"i",
".",
"Pool",
".",
"Contains",
"(",
"sip",
".",
"IP",
")",
"{",
"return",
"types",
".",
"BadRequestErrorf",
"(",
"\"",
"\"",
",",
"k",
",",
"i",
".",
"Gateway",
",",
"i",
".",
"Pool",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // Validate checks whether the IPAMData structure contains congruent data | [
"Validate",
"checks",
"whether",
"the",
"IPAMData",
"structure",
"contains",
"congruent",
"data"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/driverapi/ipamdata.go#L68-L94 | train |
docker/libnetwork | default_gateway.go | clearDefaultGW | func (sb *sandbox) clearDefaultGW() error {
var ep *endpoint
if ep = sb.getEndpointInGWNetwork(); ep == nil {
return nil
}
if err := ep.sbLeave(sb, false); err != nil {
return fmt.Errorf("container %s: endpoint leaving GW Network failed: %v", sb.containerID, err)
}
if err := ep.Delete(false); err != nil {
return fmt.Errorf("container %s: deleting endpoint on GW Network failed: %v", sb.containerID, err)
}
return nil
} | go | func (sb *sandbox) clearDefaultGW() error {
var ep *endpoint
if ep = sb.getEndpointInGWNetwork(); ep == nil {
return nil
}
if err := ep.sbLeave(sb, false); err != nil {
return fmt.Errorf("container %s: endpoint leaving GW Network failed: %v", sb.containerID, err)
}
if err := ep.Delete(false); err != nil {
return fmt.Errorf("container %s: deleting endpoint on GW Network failed: %v", sb.containerID, err)
}
return nil
} | [
"func",
"(",
"sb",
"*",
"sandbox",
")",
"clearDefaultGW",
"(",
")",
"error",
"{",
"var",
"ep",
"*",
"endpoint",
"\n\n",
"if",
"ep",
"=",
"sb",
".",
"getEndpointInGWNetwork",
"(",
")",
";",
"ep",
"==",
"nil",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"if",
"err",
":=",
"ep",
".",
"sbLeave",
"(",
"sb",
",",
"false",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"sb",
".",
"containerID",
",",
"err",
")",
"\n",
"}",
"\n",
"if",
"err",
":=",
"ep",
".",
"Delete",
"(",
"false",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"sb",
".",
"containerID",
",",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // If present, detach and remove the endpoint connecting the sandbox to the default gw network. | [
"If",
"present",
"detach",
"and",
"remove",
"the",
"endpoint",
"connecting",
"the",
"sandbox",
"to",
"the",
"default",
"gw",
"network",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/default_gateway.go#L98-L111 | train |
docker/libnetwork | default_gateway.go | needDefaultGW | func (sb *sandbox) needDefaultGW() bool {
var needGW bool
for _, ep := range sb.getConnectedEndpoints() {
if ep.endpointInGWNetwork() {
continue
}
if ep.getNetwork().Type() == "null" || ep.getNetwork().Type() == "host" {
continue
}
if ep.getNetwork().Internal() {
continue
}
// During stale sandbox cleanup, joinInfo may be nil
if ep.joinInfo != nil && ep.joinInfo.disableGatewayService {
continue
}
// TODO v6 needs to be handled.
if len(ep.Gateway()) > 0 {
return false
}
for _, r := range ep.StaticRoutes() {
if r.Destination != nil && r.Destination.String() == "0.0.0.0/0" {
return false
}
}
needGW = true
}
return needGW
} | go | func (sb *sandbox) needDefaultGW() bool {
var needGW bool
for _, ep := range sb.getConnectedEndpoints() {
if ep.endpointInGWNetwork() {
continue
}
if ep.getNetwork().Type() == "null" || ep.getNetwork().Type() == "host" {
continue
}
if ep.getNetwork().Internal() {
continue
}
// During stale sandbox cleanup, joinInfo may be nil
if ep.joinInfo != nil && ep.joinInfo.disableGatewayService {
continue
}
// TODO v6 needs to be handled.
if len(ep.Gateway()) > 0 {
return false
}
for _, r := range ep.StaticRoutes() {
if r.Destination != nil && r.Destination.String() == "0.0.0.0/0" {
return false
}
}
needGW = true
}
return needGW
} | [
"func",
"(",
"sb",
"*",
"sandbox",
")",
"needDefaultGW",
"(",
")",
"bool",
"{",
"var",
"needGW",
"bool",
"\n\n",
"for",
"_",
",",
"ep",
":=",
"range",
"sb",
".",
"getConnectedEndpoints",
"(",
")",
"{",
"if",
"ep",
".",
"endpointInGWNetwork",
"(",
")",
"{",
"continue",
"\n",
"}",
"\n",
"if",
"ep",
".",
"getNetwork",
"(",
")",
".",
"Type",
"(",
")",
"==",
"\"",
"\"",
"||",
"ep",
".",
"getNetwork",
"(",
")",
".",
"Type",
"(",
")",
"==",
"\"",
"\"",
"{",
"continue",
"\n",
"}",
"\n",
"if",
"ep",
".",
"getNetwork",
"(",
")",
".",
"Internal",
"(",
")",
"{",
"continue",
"\n",
"}",
"\n",
"// During stale sandbox cleanup, joinInfo may be nil",
"if",
"ep",
".",
"joinInfo",
"!=",
"nil",
"&&",
"ep",
".",
"joinInfo",
".",
"disableGatewayService",
"{",
"continue",
"\n",
"}",
"\n",
"// TODO v6 needs to be handled.",
"if",
"len",
"(",
"ep",
".",
"Gateway",
"(",
")",
")",
">",
"0",
"{",
"return",
"false",
"\n",
"}",
"\n",
"for",
"_",
",",
"r",
":=",
"range",
"ep",
".",
"StaticRoutes",
"(",
")",
"{",
"if",
"r",
".",
"Destination",
"!=",
"nil",
"&&",
"r",
".",
"Destination",
".",
"String",
"(",
")",
"==",
"\"",
"\"",
"{",
"return",
"false",
"\n",
"}",
"\n",
"}",
"\n",
"needGW",
"=",
"true",
"\n",
"}",
"\n\n",
"return",
"needGW",
"\n",
"}"
] | // Evaluate whether the sandbox requires a default gateway based
// on the endpoints to which it is connected. It does not account
// for the default gateway network endpoint. | [
"Evaluate",
"whether",
"the",
"sandbox",
"requires",
"a",
"default",
"gateway",
"based",
"on",
"the",
"endpoints",
"to",
"which",
"it",
"is",
"connected",
".",
"It",
"does",
"not",
"account",
"for",
"the",
"default",
"gateway",
"network",
"endpoint",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/default_gateway.go#L117-L147 | train |
docker/libnetwork | default_gateway.go | defaultGwNetwork | func (c *controller) defaultGwNetwork() (Network, error) {
procGwNetwork <- true
defer func() { <-procGwNetwork }()
n, err := c.NetworkByName(libnGWNetwork)
if _, ok := err.(types.NotFoundError); ok {
n, err = c.createGWNetwork()
}
return n, err
} | go | func (c *controller) defaultGwNetwork() (Network, error) {
procGwNetwork <- true
defer func() { <-procGwNetwork }()
n, err := c.NetworkByName(libnGWNetwork)
if _, ok := err.(types.NotFoundError); ok {
n, err = c.createGWNetwork()
}
return n, err
} | [
"func",
"(",
"c",
"*",
"controller",
")",
"defaultGwNetwork",
"(",
")",
"(",
"Network",
",",
"error",
")",
"{",
"procGwNetwork",
"<-",
"true",
"\n",
"defer",
"func",
"(",
")",
"{",
"<-",
"procGwNetwork",
"}",
"(",
")",
"\n\n",
"n",
",",
"err",
":=",
"c",
".",
"NetworkByName",
"(",
"libnGWNetwork",
")",
"\n",
"if",
"_",
",",
"ok",
":=",
"err",
".",
"(",
"types",
".",
"NotFoundError",
")",
";",
"ok",
"{",
"n",
",",
"err",
"=",
"c",
".",
"createGWNetwork",
"(",
")",
"\n",
"}",
"\n",
"return",
"n",
",",
"err",
"\n",
"}"
] | // Looks for the default gw network and creates it if not there.
// Parallel executions are serialized. | [
"Looks",
"for",
"the",
"default",
"gw",
"network",
"and",
"creates",
"it",
"if",
"not",
"there",
".",
"Parallel",
"executions",
"are",
"serialized",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/default_gateway.go#L179-L188 | train |
docker/libnetwork | default_gateway.go | getGatewayEndpoint | func (sb *sandbox) getGatewayEndpoint() *endpoint {
for _, ep := range sb.getConnectedEndpoints() {
if ep.getNetwork().Type() == "null" || ep.getNetwork().Type() == "host" {
continue
}
if len(ep.Gateway()) != 0 {
return ep
}
}
return nil
} | go | func (sb *sandbox) getGatewayEndpoint() *endpoint {
for _, ep := range sb.getConnectedEndpoints() {
if ep.getNetwork().Type() == "null" || ep.getNetwork().Type() == "host" {
continue
}
if len(ep.Gateway()) != 0 {
return ep
}
}
return nil
} | [
"func",
"(",
"sb",
"*",
"sandbox",
")",
"getGatewayEndpoint",
"(",
")",
"*",
"endpoint",
"{",
"for",
"_",
",",
"ep",
":=",
"range",
"sb",
".",
"getConnectedEndpoints",
"(",
")",
"{",
"if",
"ep",
".",
"getNetwork",
"(",
")",
".",
"Type",
"(",
")",
"==",
"\"",
"\"",
"||",
"ep",
".",
"getNetwork",
"(",
")",
".",
"Type",
"(",
")",
"==",
"\"",
"\"",
"{",
"continue",
"\n",
"}",
"\n",
"if",
"len",
"(",
"ep",
".",
"Gateway",
"(",
")",
")",
"!=",
"0",
"{",
"return",
"ep",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // Returns the endpoint which is providing external connectivity to the sandbox | [
"Returns",
"the",
"endpoint",
"which",
"is",
"providing",
"external",
"connectivity",
"to",
"the",
"sandbox"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/default_gateway.go#L191-L201 | train |
docker/libnetwork | netutils/utils.go | CheckNameserverOverlaps | func CheckNameserverOverlaps(nameservers []string, toCheck *net.IPNet) error {
if len(nameservers) > 0 {
for _, ns := range nameservers {
_, nsNetwork, err := net.ParseCIDR(ns)
if err != nil {
return err
}
if NetworkOverlaps(toCheck, nsNetwork) {
return ErrNetworkOverlapsWithNameservers
}
}
}
return nil
} | go | func CheckNameserverOverlaps(nameservers []string, toCheck *net.IPNet) error {
if len(nameservers) > 0 {
for _, ns := range nameservers {
_, nsNetwork, err := net.ParseCIDR(ns)
if err != nil {
return err
}
if NetworkOverlaps(toCheck, nsNetwork) {
return ErrNetworkOverlapsWithNameservers
}
}
}
return nil
} | [
"func",
"CheckNameserverOverlaps",
"(",
"nameservers",
"[",
"]",
"string",
",",
"toCheck",
"*",
"net",
".",
"IPNet",
")",
"error",
"{",
"if",
"len",
"(",
"nameservers",
")",
">",
"0",
"{",
"for",
"_",
",",
"ns",
":=",
"range",
"nameservers",
"{",
"_",
",",
"nsNetwork",
",",
"err",
":=",
"net",
".",
"ParseCIDR",
"(",
"ns",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"if",
"NetworkOverlaps",
"(",
"toCheck",
",",
"nsNetwork",
")",
"{",
"return",
"ErrNetworkOverlapsWithNameservers",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // CheckNameserverOverlaps checks whether the passed network overlaps with any of the nameservers | [
"CheckNameserverOverlaps",
"checks",
"whether",
"the",
"passed",
"network",
"overlaps",
"with",
"any",
"of",
"the",
"nameservers"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/netutils/utils.go#L27-L40 | train |
docker/libnetwork | netutils/utils.go | NetworkOverlaps | func NetworkOverlaps(netX *net.IPNet, netY *net.IPNet) bool {
return netX.Contains(netY.IP) || netY.Contains(netX.IP)
} | go | func NetworkOverlaps(netX *net.IPNet, netY *net.IPNet) bool {
return netX.Contains(netY.IP) || netY.Contains(netX.IP)
} | [
"func",
"NetworkOverlaps",
"(",
"netX",
"*",
"net",
".",
"IPNet",
",",
"netY",
"*",
"net",
".",
"IPNet",
")",
"bool",
"{",
"return",
"netX",
".",
"Contains",
"(",
"netY",
".",
"IP",
")",
"||",
"netY",
".",
"Contains",
"(",
"netX",
".",
"IP",
")",
"\n",
"}"
] | // NetworkOverlaps detects overlap between one IPNet and another | [
"NetworkOverlaps",
"detects",
"overlap",
"between",
"one",
"IPNet",
"and",
"another"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/netutils/utils.go#L43-L45 | train |
docker/libnetwork | netutils/utils.go | NetworkRange | func NetworkRange(network *net.IPNet) (net.IP, net.IP) {
if network == nil {
return nil, nil
}
firstIP := network.IP.Mask(network.Mask)
lastIP := types.GetIPCopy(firstIP)
for i := 0; i < len(firstIP); i++ {
lastIP[i] = firstIP[i] | ^network.Mask[i]
}
if network.IP.To4() != nil {
firstIP = firstIP.To4()
lastIP = lastIP.To4()
}
return firstIP, lastIP
} | go | func NetworkRange(network *net.IPNet) (net.IP, net.IP) {
if network == nil {
return nil, nil
}
firstIP := network.IP.Mask(network.Mask)
lastIP := types.GetIPCopy(firstIP)
for i := 0; i < len(firstIP); i++ {
lastIP[i] = firstIP[i] | ^network.Mask[i]
}
if network.IP.To4() != nil {
firstIP = firstIP.To4()
lastIP = lastIP.To4()
}
return firstIP, lastIP
} | [
"func",
"NetworkRange",
"(",
"network",
"*",
"net",
".",
"IPNet",
")",
"(",
"net",
".",
"IP",
",",
"net",
".",
"IP",
")",
"{",
"if",
"network",
"==",
"nil",
"{",
"return",
"nil",
",",
"nil",
"\n",
"}",
"\n\n",
"firstIP",
":=",
"network",
".",
"IP",
".",
"Mask",
"(",
"network",
".",
"Mask",
")",
"\n",
"lastIP",
":=",
"types",
".",
"GetIPCopy",
"(",
"firstIP",
")",
"\n",
"for",
"i",
":=",
"0",
";",
"i",
"<",
"len",
"(",
"firstIP",
")",
";",
"i",
"++",
"{",
"lastIP",
"[",
"i",
"]",
"=",
"firstIP",
"[",
"i",
"]",
"|",
"^",
"network",
".",
"Mask",
"[",
"i",
"]",
"\n",
"}",
"\n\n",
"if",
"network",
".",
"IP",
".",
"To4",
"(",
")",
"!=",
"nil",
"{",
"firstIP",
"=",
"firstIP",
".",
"To4",
"(",
")",
"\n",
"lastIP",
"=",
"lastIP",
".",
"To4",
"(",
")",
"\n",
"}",
"\n\n",
"return",
"firstIP",
",",
"lastIP",
"\n",
"}"
] | // NetworkRange calculates the first and last IP addresses in an IPNet | [
"NetworkRange",
"calculates",
"the",
"first",
"and",
"last",
"IP",
"addresses",
"in",
"an",
"IPNet"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/netutils/utils.go#L48-L65 | train |
docker/libnetwork | netutils/utils.go | GetIfaceAddr | func GetIfaceAddr(name string) (net.Addr, []net.Addr, error) {
iface, err := net.InterfaceByName(name)
if err != nil {
return nil, nil, err
}
addrs, err := iface.Addrs()
if err != nil {
return nil, nil, err
}
var addrs4 []net.Addr
var addrs6 []net.Addr
for _, addr := range addrs {
ip := (addr.(*net.IPNet)).IP
if ip4 := ip.To4(); ip4 != nil {
addrs4 = append(addrs4, addr)
} else if ip6 := ip.To16(); len(ip6) == net.IPv6len {
addrs6 = append(addrs6, addr)
}
}
switch {
case len(addrs4) == 0:
return nil, nil, fmt.Errorf("Interface %v has no IPv4 addresses", name)
case len(addrs4) > 1:
fmt.Printf("Interface %v has more than 1 IPv4 address. Defaulting to using %v\n",
name, (addrs4[0].(*net.IPNet)).IP)
}
return addrs4[0], addrs6, nil
} | go | func GetIfaceAddr(name string) (net.Addr, []net.Addr, error) {
iface, err := net.InterfaceByName(name)
if err != nil {
return nil, nil, err
}
addrs, err := iface.Addrs()
if err != nil {
return nil, nil, err
}
var addrs4 []net.Addr
var addrs6 []net.Addr
for _, addr := range addrs {
ip := (addr.(*net.IPNet)).IP
if ip4 := ip.To4(); ip4 != nil {
addrs4 = append(addrs4, addr)
} else if ip6 := ip.To16(); len(ip6) == net.IPv6len {
addrs6 = append(addrs6, addr)
}
}
switch {
case len(addrs4) == 0:
return nil, nil, fmt.Errorf("Interface %v has no IPv4 addresses", name)
case len(addrs4) > 1:
fmt.Printf("Interface %v has more than 1 IPv4 address. Defaulting to using %v\n",
name, (addrs4[0].(*net.IPNet)).IP)
}
return addrs4[0], addrs6, nil
} | [
"func",
"GetIfaceAddr",
"(",
"name",
"string",
")",
"(",
"net",
".",
"Addr",
",",
"[",
"]",
"net",
".",
"Addr",
",",
"error",
")",
"{",
"iface",
",",
"err",
":=",
"net",
".",
"InterfaceByName",
"(",
"name",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"addrs",
",",
"err",
":=",
"iface",
".",
"Addrs",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"var",
"addrs4",
"[",
"]",
"net",
".",
"Addr",
"\n",
"var",
"addrs6",
"[",
"]",
"net",
".",
"Addr",
"\n",
"for",
"_",
",",
"addr",
":=",
"range",
"addrs",
"{",
"ip",
":=",
"(",
"addr",
".",
"(",
"*",
"net",
".",
"IPNet",
")",
")",
".",
"IP",
"\n",
"if",
"ip4",
":=",
"ip",
".",
"To4",
"(",
")",
";",
"ip4",
"!=",
"nil",
"{",
"addrs4",
"=",
"append",
"(",
"addrs4",
",",
"addr",
")",
"\n",
"}",
"else",
"if",
"ip6",
":=",
"ip",
".",
"To16",
"(",
")",
";",
"len",
"(",
"ip6",
")",
"==",
"net",
".",
"IPv6len",
"{",
"addrs6",
"=",
"append",
"(",
"addrs6",
",",
"addr",
")",
"\n",
"}",
"\n",
"}",
"\n",
"switch",
"{",
"case",
"len",
"(",
"addrs4",
")",
"==",
"0",
":",
"return",
"nil",
",",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"name",
")",
"\n",
"case",
"len",
"(",
"addrs4",
")",
">",
"1",
":",
"fmt",
".",
"Printf",
"(",
"\"",
"\\n",
"\"",
",",
"name",
",",
"(",
"addrs4",
"[",
"0",
"]",
".",
"(",
"*",
"net",
".",
"IPNet",
")",
")",
".",
"IP",
")",
"\n",
"}",
"\n",
"return",
"addrs4",
"[",
"0",
"]",
",",
"addrs6",
",",
"nil",
"\n",
"}"
] | // GetIfaceAddr returns the first IPv4 address and slice of IPv6 addresses for the specified network interface | [
"GetIfaceAddr",
"returns",
"the",
"first",
"IPv4",
"address",
"and",
"slice",
"of",
"IPv6",
"addresses",
"for",
"the",
"specified",
"network",
"interface"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/netutils/utils.go#L68-L95 | train |
docker/libnetwork | netutils/utils.go | GenerateRandomName | func GenerateRandomName(prefix string, size int) (string, error) {
id := make([]byte, 32)
if _, err := io.ReadFull(rand.Reader, id); err != nil {
return "", err
}
return prefix + hex.EncodeToString(id)[:size], nil
} | go | func GenerateRandomName(prefix string, size int) (string, error) {
id := make([]byte, 32)
if _, err := io.ReadFull(rand.Reader, id); err != nil {
return "", err
}
return prefix + hex.EncodeToString(id)[:size], nil
} | [
"func",
"GenerateRandomName",
"(",
"prefix",
"string",
",",
"size",
"int",
")",
"(",
"string",
",",
"error",
")",
"{",
"id",
":=",
"make",
"(",
"[",
"]",
"byte",
",",
"32",
")",
"\n",
"if",
"_",
",",
"err",
":=",
"io",
".",
"ReadFull",
"(",
"rand",
".",
"Reader",
",",
"id",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"err",
"\n",
"}",
"\n",
"return",
"prefix",
"+",
"hex",
".",
"EncodeToString",
"(",
"id",
")",
"[",
":",
"size",
"]",
",",
"nil",
"\n",
"}"
] | // GenerateRandomName returns a new name joined with a prefix. This size
// specified is used to truncate the randomly generated value | [
"GenerateRandomName",
"returns",
"a",
"new",
"name",
"joined",
"with",
"a",
"prefix",
".",
"This",
"size",
"specified",
"is",
"used",
"to",
"truncate",
"the",
"randomly",
"generated",
"value"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/netutils/utils.go#L129-L135 | train |
docker/libnetwork | netutils/utils.go | ReverseIP | func ReverseIP(IP string) string {
var reverseIP []string
if net.ParseIP(IP).To4() != nil {
reverseIP = strings.Split(IP, ".")
l := len(reverseIP)
for i, j := 0, l-1; i < l/2; i, j = i+1, j-1 {
reverseIP[i], reverseIP[j] = reverseIP[j], reverseIP[i]
}
} else {
reverseIP = strings.Split(IP, ":")
// Reversed IPv6 is represented in dotted decimal instead of the typical
// colon hex notation
for key := range reverseIP {
if len(reverseIP[key]) == 0 { // expand the compressed 0s
reverseIP[key] = strings.Repeat("0000", 8-strings.Count(IP, ":"))
} else if len(reverseIP[key]) < 4 { // 0-padding needed
reverseIP[key] = strings.Repeat("0", 4-len(reverseIP[key])) + reverseIP[key]
}
}
reverseIP = strings.Split(strings.Join(reverseIP, ""), "")
l := len(reverseIP)
for i, j := 0, l-1; i < l/2; i, j = i+1, j-1 {
reverseIP[i], reverseIP[j] = reverseIP[j], reverseIP[i]
}
}
return strings.Join(reverseIP, ".")
} | go | func ReverseIP(IP string) string {
var reverseIP []string
if net.ParseIP(IP).To4() != nil {
reverseIP = strings.Split(IP, ".")
l := len(reverseIP)
for i, j := 0, l-1; i < l/2; i, j = i+1, j-1 {
reverseIP[i], reverseIP[j] = reverseIP[j], reverseIP[i]
}
} else {
reverseIP = strings.Split(IP, ":")
// Reversed IPv6 is represented in dotted decimal instead of the typical
// colon hex notation
for key := range reverseIP {
if len(reverseIP[key]) == 0 { // expand the compressed 0s
reverseIP[key] = strings.Repeat("0000", 8-strings.Count(IP, ":"))
} else if len(reverseIP[key]) < 4 { // 0-padding needed
reverseIP[key] = strings.Repeat("0", 4-len(reverseIP[key])) + reverseIP[key]
}
}
reverseIP = strings.Split(strings.Join(reverseIP, ""), "")
l := len(reverseIP)
for i, j := 0, l-1; i < l/2; i, j = i+1, j-1 {
reverseIP[i], reverseIP[j] = reverseIP[j], reverseIP[i]
}
}
return strings.Join(reverseIP, ".")
} | [
"func",
"ReverseIP",
"(",
"IP",
"string",
")",
"string",
"{",
"var",
"reverseIP",
"[",
"]",
"string",
"\n\n",
"if",
"net",
".",
"ParseIP",
"(",
"IP",
")",
".",
"To4",
"(",
")",
"!=",
"nil",
"{",
"reverseIP",
"=",
"strings",
".",
"Split",
"(",
"IP",
",",
"\"",
"\"",
")",
"\n",
"l",
":=",
"len",
"(",
"reverseIP",
")",
"\n",
"for",
"i",
",",
"j",
":=",
"0",
",",
"l",
"-",
"1",
";",
"i",
"<",
"l",
"/",
"2",
";",
"i",
",",
"j",
"=",
"i",
"+",
"1",
",",
"j",
"-",
"1",
"{",
"reverseIP",
"[",
"i",
"]",
",",
"reverseIP",
"[",
"j",
"]",
"=",
"reverseIP",
"[",
"j",
"]",
",",
"reverseIP",
"[",
"i",
"]",
"\n",
"}",
"\n",
"}",
"else",
"{",
"reverseIP",
"=",
"strings",
".",
"Split",
"(",
"IP",
",",
"\"",
"\"",
")",
"\n\n",
"// Reversed IPv6 is represented in dotted decimal instead of the typical",
"// colon hex notation",
"for",
"key",
":=",
"range",
"reverseIP",
"{",
"if",
"len",
"(",
"reverseIP",
"[",
"key",
"]",
")",
"==",
"0",
"{",
"// expand the compressed 0s",
"reverseIP",
"[",
"key",
"]",
"=",
"strings",
".",
"Repeat",
"(",
"\"",
"\"",
",",
"8",
"-",
"strings",
".",
"Count",
"(",
"IP",
",",
"\"",
"\"",
")",
")",
"\n",
"}",
"else",
"if",
"len",
"(",
"reverseIP",
"[",
"key",
"]",
")",
"<",
"4",
"{",
"// 0-padding needed",
"reverseIP",
"[",
"key",
"]",
"=",
"strings",
".",
"Repeat",
"(",
"\"",
"\"",
",",
"4",
"-",
"len",
"(",
"reverseIP",
"[",
"key",
"]",
")",
")",
"+",
"reverseIP",
"[",
"key",
"]",
"\n",
"}",
"\n",
"}",
"\n\n",
"reverseIP",
"=",
"strings",
".",
"Split",
"(",
"strings",
".",
"Join",
"(",
"reverseIP",
",",
"\"",
"\"",
")",
",",
"\"",
"\"",
")",
"\n\n",
"l",
":=",
"len",
"(",
"reverseIP",
")",
"\n",
"for",
"i",
",",
"j",
":=",
"0",
",",
"l",
"-",
"1",
";",
"i",
"<",
"l",
"/",
"2",
";",
"i",
",",
"j",
"=",
"i",
"+",
"1",
",",
"j",
"-",
"1",
"{",
"reverseIP",
"[",
"i",
"]",
",",
"reverseIP",
"[",
"j",
"]",
"=",
"reverseIP",
"[",
"j",
"]",
",",
"reverseIP",
"[",
"i",
"]",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"strings",
".",
"Join",
"(",
"reverseIP",
",",
"\"",
"\"",
")",
"\n",
"}"
] | // ReverseIP accepts a V4 or V6 IP string in the canonical form and returns a reversed IP in
// the dotted decimal form . This is used to setup the IP to service name mapping in the optimal
// way for the DNS PTR queries. | [
"ReverseIP",
"accepts",
"a",
"V4",
"or",
"V6",
"IP",
"string",
"in",
"the",
"canonical",
"form",
"and",
"returns",
"a",
"reversed",
"IP",
"in",
"the",
"dotted",
"decimal",
"form",
".",
"This",
"is",
"used",
"to",
"setup",
"the",
"IP",
"to",
"service",
"name",
"mapping",
"in",
"the",
"optimal",
"way",
"for",
"the",
"DNS",
"PTR",
"queries",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/netutils/utils.go#L140-L171 | train |
docker/libnetwork | ipvs/netlink.go | assembleService | func assembleService(attrs []syscall.NetlinkRouteAttr) (*Service, error) {
var s Service
for _, attr := range attrs {
attrType := int(attr.Attr.Type)
switch attrType {
case ipvsSvcAttrAddressFamily:
s.AddressFamily = native.Uint16(attr.Value)
case ipvsSvcAttrProtocol:
s.Protocol = native.Uint16(attr.Value)
case ipvsSvcAttrAddress:
ip, err := parseIP(attr.Value, s.AddressFamily)
if err != nil {
return nil, err
}
s.Address = ip
case ipvsSvcAttrPort:
s.Port = binary.BigEndian.Uint16(attr.Value)
case ipvsSvcAttrFWMark:
s.FWMark = native.Uint32(attr.Value)
case ipvsSvcAttrSchedName:
s.SchedName = nl.BytesToString(attr.Value)
case ipvsSvcAttrFlags:
s.Flags = native.Uint32(attr.Value)
case ipvsSvcAttrTimeout:
s.Timeout = native.Uint32(attr.Value)
case ipvsSvcAttrNetmask:
s.Netmask = native.Uint32(attr.Value)
case ipvsSvcAttrStats:
stats, err := assembleStats(attr.Value)
if err != nil {
return nil, err
}
s.Stats = stats
}
}
return &s, nil
} | go | func assembleService(attrs []syscall.NetlinkRouteAttr) (*Service, error) {
var s Service
for _, attr := range attrs {
attrType := int(attr.Attr.Type)
switch attrType {
case ipvsSvcAttrAddressFamily:
s.AddressFamily = native.Uint16(attr.Value)
case ipvsSvcAttrProtocol:
s.Protocol = native.Uint16(attr.Value)
case ipvsSvcAttrAddress:
ip, err := parseIP(attr.Value, s.AddressFamily)
if err != nil {
return nil, err
}
s.Address = ip
case ipvsSvcAttrPort:
s.Port = binary.BigEndian.Uint16(attr.Value)
case ipvsSvcAttrFWMark:
s.FWMark = native.Uint32(attr.Value)
case ipvsSvcAttrSchedName:
s.SchedName = nl.BytesToString(attr.Value)
case ipvsSvcAttrFlags:
s.Flags = native.Uint32(attr.Value)
case ipvsSvcAttrTimeout:
s.Timeout = native.Uint32(attr.Value)
case ipvsSvcAttrNetmask:
s.Netmask = native.Uint32(attr.Value)
case ipvsSvcAttrStats:
stats, err := assembleStats(attr.Value)
if err != nil {
return nil, err
}
s.Stats = stats
}
}
return &s, nil
} | [
"func",
"assembleService",
"(",
"attrs",
"[",
"]",
"syscall",
".",
"NetlinkRouteAttr",
")",
"(",
"*",
"Service",
",",
"error",
")",
"{",
"var",
"s",
"Service",
"\n\n",
"for",
"_",
",",
"attr",
":=",
"range",
"attrs",
"{",
"attrType",
":=",
"int",
"(",
"attr",
".",
"Attr",
".",
"Type",
")",
"\n\n",
"switch",
"attrType",
"{",
"case",
"ipvsSvcAttrAddressFamily",
":",
"s",
".",
"AddressFamily",
"=",
"native",
".",
"Uint16",
"(",
"attr",
".",
"Value",
")",
"\n",
"case",
"ipvsSvcAttrProtocol",
":",
"s",
".",
"Protocol",
"=",
"native",
".",
"Uint16",
"(",
"attr",
".",
"Value",
")",
"\n",
"case",
"ipvsSvcAttrAddress",
":",
"ip",
",",
"err",
":=",
"parseIP",
"(",
"attr",
".",
"Value",
",",
"s",
".",
"AddressFamily",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"s",
".",
"Address",
"=",
"ip",
"\n",
"case",
"ipvsSvcAttrPort",
":",
"s",
".",
"Port",
"=",
"binary",
".",
"BigEndian",
".",
"Uint16",
"(",
"attr",
".",
"Value",
")",
"\n",
"case",
"ipvsSvcAttrFWMark",
":",
"s",
".",
"FWMark",
"=",
"native",
".",
"Uint32",
"(",
"attr",
".",
"Value",
")",
"\n",
"case",
"ipvsSvcAttrSchedName",
":",
"s",
".",
"SchedName",
"=",
"nl",
".",
"BytesToString",
"(",
"attr",
".",
"Value",
")",
"\n",
"case",
"ipvsSvcAttrFlags",
":",
"s",
".",
"Flags",
"=",
"native",
".",
"Uint32",
"(",
"attr",
".",
"Value",
")",
"\n",
"case",
"ipvsSvcAttrTimeout",
":",
"s",
".",
"Timeout",
"=",
"native",
".",
"Uint32",
"(",
"attr",
".",
"Value",
")",
"\n",
"case",
"ipvsSvcAttrNetmask",
":",
"s",
".",
"Netmask",
"=",
"native",
".",
"Uint32",
"(",
"attr",
".",
"Value",
")",
"\n",
"case",
"ipvsSvcAttrStats",
":",
"stats",
",",
"err",
":=",
"assembleStats",
"(",
"attr",
".",
"Value",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"s",
".",
"Stats",
"=",
"stats",
"\n",
"}",
"\n\n",
"}",
"\n",
"return",
"&",
"s",
",",
"nil",
"\n",
"}"
] | // assembleService assembles a services back from a hain of netlink attributes | [
"assembleService",
"assembles",
"a",
"services",
"back",
"from",
"a",
"hain",
"of",
"netlink",
"attributes"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/netlink.go#L315-L357 | train |
docker/libnetwork | ipvs/netlink.go | parseService | func (i *Handle) parseService(msg []byte) (*Service, error) {
var s *Service
//Remove General header for this message and parse the NetLink message
hdr := deserializeGenlMsg(msg)
NetLinkAttrs, err := nl.ParseRouteAttr(msg[hdr.Len():])
if err != nil {
return nil, err
}
if len(NetLinkAttrs) == 0 {
return nil, fmt.Errorf("error no valid netlink message found while parsing service record")
}
//Now Parse and get IPVS related attributes messages packed in this message.
ipvsAttrs, err := nl.ParseRouteAttr(NetLinkAttrs[0].Value)
if err != nil {
return nil, err
}
//Assemble all the IPVS related attribute messages and create a service record
s, err = assembleService(ipvsAttrs)
if err != nil {
return nil, err
}
return s, nil
} | go | func (i *Handle) parseService(msg []byte) (*Service, error) {
var s *Service
//Remove General header for this message and parse the NetLink message
hdr := deserializeGenlMsg(msg)
NetLinkAttrs, err := nl.ParseRouteAttr(msg[hdr.Len():])
if err != nil {
return nil, err
}
if len(NetLinkAttrs) == 0 {
return nil, fmt.Errorf("error no valid netlink message found while parsing service record")
}
//Now Parse and get IPVS related attributes messages packed in this message.
ipvsAttrs, err := nl.ParseRouteAttr(NetLinkAttrs[0].Value)
if err != nil {
return nil, err
}
//Assemble all the IPVS related attribute messages and create a service record
s, err = assembleService(ipvsAttrs)
if err != nil {
return nil, err
}
return s, nil
} | [
"func",
"(",
"i",
"*",
"Handle",
")",
"parseService",
"(",
"msg",
"[",
"]",
"byte",
")",
"(",
"*",
"Service",
",",
"error",
")",
"{",
"var",
"s",
"*",
"Service",
"\n\n",
"//Remove General header for this message and parse the NetLink message",
"hdr",
":=",
"deserializeGenlMsg",
"(",
"msg",
")",
"\n",
"NetLinkAttrs",
",",
"err",
":=",
"nl",
".",
"ParseRouteAttr",
"(",
"msg",
"[",
"hdr",
".",
"Len",
"(",
")",
":",
"]",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"len",
"(",
"NetLinkAttrs",
")",
"==",
"0",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"//Now Parse and get IPVS related attributes messages packed in this message.",
"ipvsAttrs",
",",
"err",
":=",
"nl",
".",
"ParseRouteAttr",
"(",
"NetLinkAttrs",
"[",
"0",
"]",
".",
"Value",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"//Assemble all the IPVS related attribute messages and create a service record",
"s",
",",
"err",
"=",
"assembleService",
"(",
"ipvsAttrs",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"s",
",",
"nil",
"\n",
"}"
] | // parseService given a ipvs netlink response this function will respond with a valid service entry, an error otherwise | [
"parseService",
"given",
"a",
"ipvs",
"netlink",
"response",
"this",
"function",
"will",
"respond",
"with",
"a",
"valid",
"service",
"entry",
"an",
"error",
"otherwise"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/netlink.go#L360-L387 | train |
docker/libnetwork | ipvs/netlink.go | doCmdWithoutAttr | func (i *Handle) doCmdWithoutAttr(cmd uint8) ([][]byte, error) {
req := newIPVSRequest(cmd)
req.Seq = atomic.AddUint32(&i.seq, 1)
return execute(i.sock, req, 0)
} | go | func (i *Handle) doCmdWithoutAttr(cmd uint8) ([][]byte, error) {
req := newIPVSRequest(cmd)
req.Seq = atomic.AddUint32(&i.seq, 1)
return execute(i.sock, req, 0)
} | [
"func",
"(",
"i",
"*",
"Handle",
")",
"doCmdWithoutAttr",
"(",
"cmd",
"uint8",
")",
"(",
"[",
"]",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"req",
":=",
"newIPVSRequest",
"(",
"cmd",
")",
"\n",
"req",
".",
"Seq",
"=",
"atomic",
".",
"AddUint32",
"(",
"&",
"i",
".",
"seq",
",",
"1",
")",
"\n",
"return",
"execute",
"(",
"i",
".",
"sock",
",",
"req",
",",
"0",
")",
"\n",
"}"
] | // doCmdWithoutAttr a simple wrapper of netlink socket execute command | [
"doCmdWithoutAttr",
"a",
"simple",
"wrapper",
"of",
"netlink",
"socket",
"execute",
"command"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/netlink.go#L410-L414 | train |
docker/libnetwork | ipvs/netlink.go | parseDestination | func (i *Handle) parseDestination(msg []byte) (*Destination, error) {
var dst *Destination
//Remove General header for this message
hdr := deserializeGenlMsg(msg)
NetLinkAttrs, err := nl.ParseRouteAttr(msg[hdr.Len():])
if err != nil {
return nil, err
}
if len(NetLinkAttrs) == 0 {
return nil, fmt.Errorf("error no valid netlink message found while parsing destination record")
}
//Now Parse and get IPVS related attributes messages packed in this message.
ipvsAttrs, err := nl.ParseRouteAttr(NetLinkAttrs[0].Value)
if err != nil {
return nil, err
}
//Assemble netlink attributes and create a Destination record
dst, err = assembleDestination(ipvsAttrs)
if err != nil {
return nil, err
}
return dst, nil
} | go | func (i *Handle) parseDestination(msg []byte) (*Destination, error) {
var dst *Destination
//Remove General header for this message
hdr := deserializeGenlMsg(msg)
NetLinkAttrs, err := nl.ParseRouteAttr(msg[hdr.Len():])
if err != nil {
return nil, err
}
if len(NetLinkAttrs) == 0 {
return nil, fmt.Errorf("error no valid netlink message found while parsing destination record")
}
//Now Parse and get IPVS related attributes messages packed in this message.
ipvsAttrs, err := nl.ParseRouteAttr(NetLinkAttrs[0].Value)
if err != nil {
return nil, err
}
//Assemble netlink attributes and create a Destination record
dst, err = assembleDestination(ipvsAttrs)
if err != nil {
return nil, err
}
return dst, nil
} | [
"func",
"(",
"i",
"*",
"Handle",
")",
"parseDestination",
"(",
"msg",
"[",
"]",
"byte",
")",
"(",
"*",
"Destination",
",",
"error",
")",
"{",
"var",
"dst",
"*",
"Destination",
"\n\n",
"//Remove General header for this message",
"hdr",
":=",
"deserializeGenlMsg",
"(",
"msg",
")",
"\n",
"NetLinkAttrs",
",",
"err",
":=",
"nl",
".",
"ParseRouteAttr",
"(",
"msg",
"[",
"hdr",
".",
"Len",
"(",
")",
":",
"]",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"len",
"(",
"NetLinkAttrs",
")",
"==",
"0",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"//Now Parse and get IPVS related attributes messages packed in this message.",
"ipvsAttrs",
",",
"err",
":=",
"nl",
".",
"ParseRouteAttr",
"(",
"NetLinkAttrs",
"[",
"0",
"]",
".",
"Value",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"//Assemble netlink attributes and create a Destination record",
"dst",
",",
"err",
"=",
"assembleDestination",
"(",
"ipvsAttrs",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"dst",
",",
"nil",
"\n",
"}"
] | // parseDestination given a ipvs netlink response this function will respond with a valid destination entry, an error otherwise | [
"parseDestination",
"given",
"a",
"ipvs",
"netlink",
"response",
"this",
"function",
"will",
"respond",
"with",
"a",
"valid",
"destination",
"entry",
"an",
"error",
"otherwise"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/netlink.go#L459-L485 | train |
docker/libnetwork | ipvs/netlink.go | parseConfig | func (i *Handle) parseConfig(msg []byte) (*Config, error) {
var c Config
//Remove General header for this message
hdr := deserializeGenlMsg(msg)
attrs, err := nl.ParseRouteAttr(msg[hdr.Len():])
if err != nil {
return nil, err
}
for _, attr := range attrs {
attrType := int(attr.Attr.Type)
switch attrType {
case ipvsCmdAttrTimeoutTCP:
c.TimeoutTCP = time.Duration(native.Uint32(attr.Value)) * time.Second
case ipvsCmdAttrTimeoutTCPFin:
c.TimeoutTCPFin = time.Duration(native.Uint32(attr.Value)) * time.Second
case ipvsCmdAttrTimeoutUDP:
c.TimeoutUDP = time.Duration(native.Uint32(attr.Value)) * time.Second
}
}
return &c, nil
} | go | func (i *Handle) parseConfig(msg []byte) (*Config, error) {
var c Config
//Remove General header for this message
hdr := deserializeGenlMsg(msg)
attrs, err := nl.ParseRouteAttr(msg[hdr.Len():])
if err != nil {
return nil, err
}
for _, attr := range attrs {
attrType := int(attr.Attr.Type)
switch attrType {
case ipvsCmdAttrTimeoutTCP:
c.TimeoutTCP = time.Duration(native.Uint32(attr.Value)) * time.Second
case ipvsCmdAttrTimeoutTCPFin:
c.TimeoutTCPFin = time.Duration(native.Uint32(attr.Value)) * time.Second
case ipvsCmdAttrTimeoutUDP:
c.TimeoutUDP = time.Duration(native.Uint32(attr.Value)) * time.Second
}
}
return &c, nil
} | [
"func",
"(",
"i",
"*",
"Handle",
")",
"parseConfig",
"(",
"msg",
"[",
"]",
"byte",
")",
"(",
"*",
"Config",
",",
"error",
")",
"{",
"var",
"c",
"Config",
"\n\n",
"//Remove General header for this message",
"hdr",
":=",
"deserializeGenlMsg",
"(",
"msg",
")",
"\n",
"attrs",
",",
"err",
":=",
"nl",
".",
"ParseRouteAttr",
"(",
"msg",
"[",
"hdr",
".",
"Len",
"(",
")",
":",
"]",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"attr",
":=",
"range",
"attrs",
"{",
"attrType",
":=",
"int",
"(",
"attr",
".",
"Attr",
".",
"Type",
")",
"\n",
"switch",
"attrType",
"{",
"case",
"ipvsCmdAttrTimeoutTCP",
":",
"c",
".",
"TimeoutTCP",
"=",
"time",
".",
"Duration",
"(",
"native",
".",
"Uint32",
"(",
"attr",
".",
"Value",
")",
")",
"*",
"time",
".",
"Second",
"\n",
"case",
"ipvsCmdAttrTimeoutTCPFin",
":",
"c",
".",
"TimeoutTCPFin",
"=",
"time",
".",
"Duration",
"(",
"native",
".",
"Uint32",
"(",
"attr",
".",
"Value",
")",
")",
"*",
"time",
".",
"Second",
"\n",
"case",
"ipvsCmdAttrTimeoutUDP",
":",
"c",
".",
"TimeoutUDP",
"=",
"time",
".",
"Duration",
"(",
"native",
".",
"Uint32",
"(",
"attr",
".",
"Value",
")",
")",
"*",
"time",
".",
"Second",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"&",
"c",
",",
"nil",
"\n",
"}"
] | // parseConfig given a ipvs netlink response this function will respond with a valid config entry, an error otherwise | [
"parseConfig",
"given",
"a",
"ipvs",
"netlink",
"response",
"this",
"function",
"will",
"respond",
"with",
"a",
"valid",
"config",
"entry",
"an",
"error",
"otherwise"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/netlink.go#L508-L531 | train |
docker/libnetwork | ipvs/netlink.go | doGetConfigCmd | func (i *Handle) doGetConfigCmd() (*Config, error) {
msg, err := i.doCmdWithoutAttr(ipvsCmdGetConfig)
if err != nil {
return nil, err
}
res, err := i.parseConfig(msg[0])
if err != nil {
return res, err
}
return res, nil
} | go | func (i *Handle) doGetConfigCmd() (*Config, error) {
msg, err := i.doCmdWithoutAttr(ipvsCmdGetConfig)
if err != nil {
return nil, err
}
res, err := i.parseConfig(msg[0])
if err != nil {
return res, err
}
return res, nil
} | [
"func",
"(",
"i",
"*",
"Handle",
")",
"doGetConfigCmd",
"(",
")",
"(",
"*",
"Config",
",",
"error",
")",
"{",
"msg",
",",
"err",
":=",
"i",
".",
"doCmdWithoutAttr",
"(",
"ipvsCmdGetConfig",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"res",
",",
"err",
":=",
"i",
".",
"parseConfig",
"(",
"msg",
"[",
"0",
"]",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n",
"return",
"res",
",",
"nil",
"\n",
"}"
] | // doGetConfigCmd a wrapper function to be used by GetConfig | [
"doGetConfigCmd",
"a",
"wrapper",
"function",
"to",
"be",
"used",
"by",
"GetConfig"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/netlink.go#L534-L545 | train |
docker/libnetwork | ipvs/netlink.go | doSetConfigCmd | func (i *Handle) doSetConfigCmd(c *Config) error {
req := newIPVSRequest(ipvsCmdSetConfig)
req.Seq = atomic.AddUint32(&i.seq, 1)
req.AddData(nl.NewRtAttr(ipvsCmdAttrTimeoutTCP, nl.Uint32Attr(uint32(c.TimeoutTCP.Seconds()))))
req.AddData(nl.NewRtAttr(ipvsCmdAttrTimeoutTCPFin, nl.Uint32Attr(uint32(c.TimeoutTCPFin.Seconds()))))
req.AddData(nl.NewRtAttr(ipvsCmdAttrTimeoutUDP, nl.Uint32Attr(uint32(c.TimeoutUDP.Seconds()))))
_, err := execute(i.sock, req, 0)
return err
} | go | func (i *Handle) doSetConfigCmd(c *Config) error {
req := newIPVSRequest(ipvsCmdSetConfig)
req.Seq = atomic.AddUint32(&i.seq, 1)
req.AddData(nl.NewRtAttr(ipvsCmdAttrTimeoutTCP, nl.Uint32Attr(uint32(c.TimeoutTCP.Seconds()))))
req.AddData(nl.NewRtAttr(ipvsCmdAttrTimeoutTCPFin, nl.Uint32Attr(uint32(c.TimeoutTCPFin.Seconds()))))
req.AddData(nl.NewRtAttr(ipvsCmdAttrTimeoutUDP, nl.Uint32Attr(uint32(c.TimeoutUDP.Seconds()))))
_, err := execute(i.sock, req, 0)
return err
} | [
"func",
"(",
"i",
"*",
"Handle",
")",
"doSetConfigCmd",
"(",
"c",
"*",
"Config",
")",
"error",
"{",
"req",
":=",
"newIPVSRequest",
"(",
"ipvsCmdSetConfig",
")",
"\n",
"req",
".",
"Seq",
"=",
"atomic",
".",
"AddUint32",
"(",
"&",
"i",
".",
"seq",
",",
"1",
")",
"\n\n",
"req",
".",
"AddData",
"(",
"nl",
".",
"NewRtAttr",
"(",
"ipvsCmdAttrTimeoutTCP",
",",
"nl",
".",
"Uint32Attr",
"(",
"uint32",
"(",
"c",
".",
"TimeoutTCP",
".",
"Seconds",
"(",
")",
")",
")",
")",
")",
"\n",
"req",
".",
"AddData",
"(",
"nl",
".",
"NewRtAttr",
"(",
"ipvsCmdAttrTimeoutTCPFin",
",",
"nl",
".",
"Uint32Attr",
"(",
"uint32",
"(",
"c",
".",
"TimeoutTCPFin",
".",
"Seconds",
"(",
")",
")",
")",
")",
")",
"\n",
"req",
".",
"AddData",
"(",
"nl",
".",
"NewRtAttr",
"(",
"ipvsCmdAttrTimeoutUDP",
",",
"nl",
".",
"Uint32Attr",
"(",
"uint32",
"(",
"c",
".",
"TimeoutUDP",
".",
"Seconds",
"(",
")",
")",
")",
")",
")",
"\n\n",
"_",
",",
"err",
":=",
"execute",
"(",
"i",
".",
"sock",
",",
"req",
",",
"0",
")",
"\n\n",
"return",
"err",
"\n",
"}"
] | // doSetConfigCmd a wrapper function to be used by SetConfig | [
"doSetConfigCmd",
"a",
"wrapper",
"function",
"to",
"be",
"used",
"by",
"SetConfig"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/netlink.go#L548-L559 | train |
docker/libnetwork | drivers/bridge/setup_device.go | setupDeviceUp | func setupDeviceUp(config *networkConfiguration, i *bridgeInterface) error {
err := i.nlh.LinkSetUp(i.Link)
if err != nil {
return fmt.Errorf("Failed to set link up for %s: %v", config.BridgeName, err)
}
// Attempt to update the bridge interface to refresh the flags status,
// ignoring any failure to do so.
if lnk, err := i.nlh.LinkByName(config.BridgeName); err == nil {
i.Link = lnk
} else {
logrus.Warnf("Failed to retrieve link for interface (%s): %v", config.BridgeName, err)
}
return nil
} | go | func setupDeviceUp(config *networkConfiguration, i *bridgeInterface) error {
err := i.nlh.LinkSetUp(i.Link)
if err != nil {
return fmt.Errorf("Failed to set link up for %s: %v", config.BridgeName, err)
}
// Attempt to update the bridge interface to refresh the flags status,
// ignoring any failure to do so.
if lnk, err := i.nlh.LinkByName(config.BridgeName); err == nil {
i.Link = lnk
} else {
logrus.Warnf("Failed to retrieve link for interface (%s): %v", config.BridgeName, err)
}
return nil
} | [
"func",
"setupDeviceUp",
"(",
"config",
"*",
"networkConfiguration",
",",
"i",
"*",
"bridgeInterface",
")",
"error",
"{",
"err",
":=",
"i",
".",
"nlh",
".",
"LinkSetUp",
"(",
"i",
".",
"Link",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"config",
".",
"BridgeName",
",",
"err",
")",
"\n",
"}",
"\n\n",
"// Attempt to update the bridge interface to refresh the flags status,",
"// ignoring any failure to do so.",
"if",
"lnk",
",",
"err",
":=",
"i",
".",
"nlh",
".",
"LinkByName",
"(",
"config",
".",
"BridgeName",
")",
";",
"err",
"==",
"nil",
"{",
"i",
".",
"Link",
"=",
"lnk",
"\n",
"}",
"else",
"{",
"logrus",
".",
"Warnf",
"(",
"\"",
"\"",
",",
"config",
".",
"BridgeName",
",",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // SetupDeviceUp ups the given bridge interface. | [
"SetupDeviceUp",
"ups",
"the",
"given",
"bridge",
"interface",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/bridge/setup_device.go#L54-L68 | train |
docker/libnetwork | portallocator/portallocator.go | Error | func (e ErrPortAlreadyAllocated) Error() string {
return fmt.Sprintf("Bind for %s:%d failed: port is already allocated", e.ip, e.port)
} | go | func (e ErrPortAlreadyAllocated) Error() string {
return fmt.Sprintf("Bind for %s:%d failed: port is already allocated", e.ip, e.port)
} | [
"func",
"(",
"e",
"ErrPortAlreadyAllocated",
")",
"Error",
"(",
")",
"string",
"{",
"return",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"e",
".",
"ip",
",",
"e",
".",
"port",
")",
"\n",
"}"
] | // Error is the implementation of error.Error interface | [
"Error",
"is",
"the",
"implementation",
"of",
"error",
".",
"Error",
"interface"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/portallocator/portallocator.go#L59-L61 | train |
docker/libnetwork | portallocator/portallocator.go | RequestPort | func (p *PortAllocator) RequestPort(ip net.IP, proto string, port int) (int, error) {
return p.RequestPortInRange(ip, proto, port, port)
} | go | func (p *PortAllocator) RequestPort(ip net.IP, proto string, port int) (int, error) {
return p.RequestPortInRange(ip, proto, port, port)
} | [
"func",
"(",
"p",
"*",
"PortAllocator",
")",
"RequestPort",
"(",
"ip",
"net",
".",
"IP",
",",
"proto",
"string",
",",
"port",
"int",
")",
"(",
"int",
",",
"error",
")",
"{",
"return",
"p",
".",
"RequestPortInRange",
"(",
"ip",
",",
"proto",
",",
"port",
",",
"port",
")",
"\n",
"}"
] | // RequestPort requests new port from global ports pool for specified ip and proto.
// If port is 0 it returns first free port. Otherwise it checks port availability
// in proto's pool and returns that port or error if port is already busy. | [
"RequestPort",
"requests",
"new",
"port",
"from",
"global",
"ports",
"pool",
"for",
"specified",
"ip",
"and",
"proto",
".",
"If",
"port",
"is",
"0",
"it",
"returns",
"first",
"free",
"port",
".",
"Otherwise",
"it",
"checks",
"port",
"availability",
"in",
"proto",
"s",
"pool",
"and",
"returns",
"that",
"port",
"or",
"error",
"if",
"port",
"is",
"already",
"busy",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/portallocator/portallocator.go#L110-L112 | train |
docker/libnetwork | portallocator/portallocator.go | ReleasePort | func (p *PortAllocator) ReleasePort(ip net.IP, proto string, port int) error {
p.mutex.Lock()
defer p.mutex.Unlock()
if ip == nil {
ip = defaultIP
}
protomap, ok := p.ipMap[ip.String()]
if !ok {
return nil
}
delete(protomap[proto].p, port)
return nil
} | go | func (p *PortAllocator) ReleasePort(ip net.IP, proto string, port int) error {
p.mutex.Lock()
defer p.mutex.Unlock()
if ip == nil {
ip = defaultIP
}
protomap, ok := p.ipMap[ip.String()]
if !ok {
return nil
}
delete(protomap[proto].p, port)
return nil
} | [
"func",
"(",
"p",
"*",
"PortAllocator",
")",
"ReleasePort",
"(",
"ip",
"net",
".",
"IP",
",",
"proto",
"string",
",",
"port",
"int",
")",
"error",
"{",
"p",
".",
"mutex",
".",
"Lock",
"(",
")",
"\n",
"defer",
"p",
".",
"mutex",
".",
"Unlock",
"(",
")",
"\n\n",
"if",
"ip",
"==",
"nil",
"{",
"ip",
"=",
"defaultIP",
"\n",
"}",
"\n",
"protomap",
",",
"ok",
":=",
"p",
".",
"ipMap",
"[",
"ip",
".",
"String",
"(",
")",
"]",
"\n",
"if",
"!",
"ok",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"delete",
"(",
"protomap",
"[",
"proto",
"]",
".",
"p",
",",
"port",
")",
"\n",
"return",
"nil",
"\n",
"}"
] | // ReleasePort releases port from global ports pool for specified ip and proto. | [
"ReleasePort",
"releases",
"port",
"from",
"global",
"ports",
"pool",
"for",
"specified",
"ip",
"and",
"proto",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/portallocator/portallocator.go#L158-L171 | train |
docker/libnetwork | portallocator/portallocator.go | ReleaseAll | func (p *PortAllocator) ReleaseAll() error {
p.mutex.Lock()
p.ipMap = ipMapping{}
p.mutex.Unlock()
return nil
} | go | func (p *PortAllocator) ReleaseAll() error {
p.mutex.Lock()
p.ipMap = ipMapping{}
p.mutex.Unlock()
return nil
} | [
"func",
"(",
"p",
"*",
"PortAllocator",
")",
"ReleaseAll",
"(",
")",
"error",
"{",
"p",
".",
"mutex",
".",
"Lock",
"(",
")",
"\n",
"p",
".",
"ipMap",
"=",
"ipMapping",
"{",
"}",
"\n",
"p",
".",
"mutex",
".",
"Unlock",
"(",
")",
"\n",
"return",
"nil",
"\n",
"}"
] | // ReleaseAll releases all ports for all ips. | [
"ReleaseAll",
"releases",
"all",
"ports",
"for",
"all",
"ips",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/portallocator/portallocator.go#L186-L191 | train |
docker/libnetwork | drivers/macvlan/macvlan_setup.go | createMacVlan | func createMacVlan(containerIfName, parent, macvlanMode string) (string, error) {
// Set the macvlan mode. Default is bridge mode
mode, err := setMacVlanMode(macvlanMode)
if err != nil {
return "", fmt.Errorf("Unsupported %s macvlan mode: %v", macvlanMode, err)
}
// verify the Docker host interface acting as the macvlan parent iface exists
if !parentExists(parent) {
return "", fmt.Errorf("the requested parent interface %s was not found on the Docker host", parent)
}
// Get the link for the master index (Example: the docker host eth iface)
parentLink, err := ns.NlHandle().LinkByName(parent)
if err != nil {
return "", fmt.Errorf("error occurred looking up the %s parent iface %s error: %s", macvlanType, parent, err)
}
// Create a macvlan link
macvlan := &netlink.Macvlan{
LinkAttrs: netlink.LinkAttrs{
Name: containerIfName,
ParentIndex: parentLink.Attrs().Index,
},
Mode: mode,
}
if err := ns.NlHandle().LinkAdd(macvlan); err != nil {
// If a user creates a macvlan and ipvlan on same parent, only one slave iface can be active at a time.
return "", fmt.Errorf("failed to create the %s port: %v", macvlanType, err)
}
return macvlan.Attrs().Name, nil
} | go | func createMacVlan(containerIfName, parent, macvlanMode string) (string, error) {
// Set the macvlan mode. Default is bridge mode
mode, err := setMacVlanMode(macvlanMode)
if err != nil {
return "", fmt.Errorf("Unsupported %s macvlan mode: %v", macvlanMode, err)
}
// verify the Docker host interface acting as the macvlan parent iface exists
if !parentExists(parent) {
return "", fmt.Errorf("the requested parent interface %s was not found on the Docker host", parent)
}
// Get the link for the master index (Example: the docker host eth iface)
parentLink, err := ns.NlHandle().LinkByName(parent)
if err != nil {
return "", fmt.Errorf("error occurred looking up the %s parent iface %s error: %s", macvlanType, parent, err)
}
// Create a macvlan link
macvlan := &netlink.Macvlan{
LinkAttrs: netlink.LinkAttrs{
Name: containerIfName,
ParentIndex: parentLink.Attrs().Index,
},
Mode: mode,
}
if err := ns.NlHandle().LinkAdd(macvlan); err != nil {
// If a user creates a macvlan and ipvlan on same parent, only one slave iface can be active at a time.
return "", fmt.Errorf("failed to create the %s port: %v", macvlanType, err)
}
return macvlan.Attrs().Name, nil
} | [
"func",
"createMacVlan",
"(",
"containerIfName",
",",
"parent",
",",
"macvlanMode",
"string",
")",
"(",
"string",
",",
"error",
")",
"{",
"// Set the macvlan mode. Default is bridge mode",
"mode",
",",
"err",
":=",
"setMacVlanMode",
"(",
"macvlanMode",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"macvlanMode",
",",
"err",
")",
"\n",
"}",
"\n",
"// verify the Docker host interface acting as the macvlan parent iface exists",
"if",
"!",
"parentExists",
"(",
"parent",
")",
"{",
"return",
"\"",
"\"",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"parent",
")",
"\n",
"}",
"\n",
"// Get the link for the master index (Example: the docker host eth iface)",
"parentLink",
",",
"err",
":=",
"ns",
".",
"NlHandle",
"(",
")",
".",
"LinkByName",
"(",
"parent",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"macvlanType",
",",
"parent",
",",
"err",
")",
"\n",
"}",
"\n",
"// Create a macvlan link",
"macvlan",
":=",
"&",
"netlink",
".",
"Macvlan",
"{",
"LinkAttrs",
":",
"netlink",
".",
"LinkAttrs",
"{",
"Name",
":",
"containerIfName",
",",
"ParentIndex",
":",
"parentLink",
".",
"Attrs",
"(",
")",
".",
"Index",
",",
"}",
",",
"Mode",
":",
"mode",
",",
"}",
"\n",
"if",
"err",
":=",
"ns",
".",
"NlHandle",
"(",
")",
".",
"LinkAdd",
"(",
"macvlan",
")",
";",
"err",
"!=",
"nil",
"{",
"// If a user creates a macvlan and ipvlan on same parent, only one slave iface can be active at a time.",
"return",
"\"",
"\"",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"macvlanType",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"macvlan",
".",
"Attrs",
"(",
")",
".",
"Name",
",",
"nil",
"\n",
"}"
] | // Create the macvlan slave specifying the source name | [
"Create",
"the",
"macvlan",
"slave",
"specifying",
"the",
"source",
"name"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/macvlan/macvlan_setup.go#L20-L49 | train |
docker/libnetwork | drivers/macvlan/macvlan_setup.go | setMacVlanMode | func setMacVlanMode(mode string) (netlink.MacvlanMode, error) {
switch mode {
case modePrivate:
return netlink.MACVLAN_MODE_PRIVATE, nil
case modeVepa:
return netlink.MACVLAN_MODE_VEPA, nil
case modeBridge:
return netlink.MACVLAN_MODE_BRIDGE, nil
case modePassthru:
return netlink.MACVLAN_MODE_PASSTHRU, nil
default:
return 0, fmt.Errorf("unknown macvlan mode: %s", mode)
}
} | go | func setMacVlanMode(mode string) (netlink.MacvlanMode, error) {
switch mode {
case modePrivate:
return netlink.MACVLAN_MODE_PRIVATE, nil
case modeVepa:
return netlink.MACVLAN_MODE_VEPA, nil
case modeBridge:
return netlink.MACVLAN_MODE_BRIDGE, nil
case modePassthru:
return netlink.MACVLAN_MODE_PASSTHRU, nil
default:
return 0, fmt.Errorf("unknown macvlan mode: %s", mode)
}
} | [
"func",
"setMacVlanMode",
"(",
"mode",
"string",
")",
"(",
"netlink",
".",
"MacvlanMode",
",",
"error",
")",
"{",
"switch",
"mode",
"{",
"case",
"modePrivate",
":",
"return",
"netlink",
".",
"MACVLAN_MODE_PRIVATE",
",",
"nil",
"\n",
"case",
"modeVepa",
":",
"return",
"netlink",
".",
"MACVLAN_MODE_VEPA",
",",
"nil",
"\n",
"case",
"modeBridge",
":",
"return",
"netlink",
".",
"MACVLAN_MODE_BRIDGE",
",",
"nil",
"\n",
"case",
"modePassthru",
":",
"return",
"netlink",
".",
"MACVLAN_MODE_PASSTHRU",
",",
"nil",
"\n",
"default",
":",
"return",
"0",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"mode",
")",
"\n",
"}",
"\n",
"}"
] | // setMacVlanMode setter for one of the four macvlan port types | [
"setMacVlanMode",
"setter",
"for",
"one",
"of",
"the",
"four",
"macvlan",
"port",
"types"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/macvlan/macvlan_setup.go#L52-L65 | train |
docker/libnetwork | drivers/macvlan/macvlan_setup.go | delVlanLink | func delVlanLink(linkName string) error {
if strings.Contains(linkName, ".") {
_, _, err := parseVlan(linkName)
if err != nil {
return err
}
// delete the vlan subinterface
vlanLink, err := ns.NlHandle().LinkByName(linkName)
if err != nil {
return fmt.Errorf("failed to find interface %s on the Docker host : %v", linkName, err)
}
// verify a parent interface isn't being deleted
if vlanLink.Attrs().ParentIndex == 0 {
return fmt.Errorf("interface %s does not appear to be a slave device: %v", linkName, err)
}
// delete the macvlan slave device
if err := ns.NlHandle().LinkDel(vlanLink); err != nil {
return fmt.Errorf("failed to delete %s link: %v", linkName, err)
}
logrus.Debugf("Deleted a vlan tagged netlink subinterface: %s", linkName)
}
// if the subinterface doesn't parse to iface.vlan_id leave the interface in
// place since it could be a user specified name not created by the driver.
return nil
} | go | func delVlanLink(linkName string) error {
if strings.Contains(linkName, ".") {
_, _, err := parseVlan(linkName)
if err != nil {
return err
}
// delete the vlan subinterface
vlanLink, err := ns.NlHandle().LinkByName(linkName)
if err != nil {
return fmt.Errorf("failed to find interface %s on the Docker host : %v", linkName, err)
}
// verify a parent interface isn't being deleted
if vlanLink.Attrs().ParentIndex == 0 {
return fmt.Errorf("interface %s does not appear to be a slave device: %v", linkName, err)
}
// delete the macvlan slave device
if err := ns.NlHandle().LinkDel(vlanLink); err != nil {
return fmt.Errorf("failed to delete %s link: %v", linkName, err)
}
logrus.Debugf("Deleted a vlan tagged netlink subinterface: %s", linkName)
}
// if the subinterface doesn't parse to iface.vlan_id leave the interface in
// place since it could be a user specified name not created by the driver.
return nil
} | [
"func",
"delVlanLink",
"(",
"linkName",
"string",
")",
"error",
"{",
"if",
"strings",
".",
"Contains",
"(",
"linkName",
",",
"\"",
"\"",
")",
"{",
"_",
",",
"_",
",",
"err",
":=",
"parseVlan",
"(",
"linkName",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"// delete the vlan subinterface",
"vlanLink",
",",
"err",
":=",
"ns",
".",
"NlHandle",
"(",
")",
".",
"LinkByName",
"(",
"linkName",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"linkName",
",",
"err",
")",
"\n",
"}",
"\n",
"// verify a parent interface isn't being deleted",
"if",
"vlanLink",
".",
"Attrs",
"(",
")",
".",
"ParentIndex",
"==",
"0",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"linkName",
",",
"err",
")",
"\n",
"}",
"\n",
"// delete the macvlan slave device",
"if",
"err",
":=",
"ns",
".",
"NlHandle",
"(",
")",
".",
"LinkDel",
"(",
"vlanLink",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"linkName",
",",
"err",
")",
"\n",
"}",
"\n",
"logrus",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"linkName",
")",
"\n",
"}",
"\n",
"// if the subinterface doesn't parse to iface.vlan_id leave the interface in",
"// place since it could be a user specified name not created by the driver.",
"return",
"nil",
"\n",
"}"
] | // delVlanLink verifies only sub-interfaces with a vlan id get deleted | [
"delVlanLink",
"verifies",
"only",
"sub",
"-",
"interfaces",
"with",
"a",
"vlan",
"id",
"get",
"deleted"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/macvlan/macvlan_setup.go#L116-L140 | train |
docker/libnetwork | resolvconf/resolvconf.go | GetSpecific | func GetSpecific(path string) (*File, error) {
resolv, err := ioutil.ReadFile(path)
if err != nil {
return nil, err
}
hash, err := ioutils.HashData(bytes.NewReader(resolv))
if err != nil {
return nil, err
}
return &File{Content: resolv, Hash: hash}, nil
} | go | func GetSpecific(path string) (*File, error) {
resolv, err := ioutil.ReadFile(path)
if err != nil {
return nil, err
}
hash, err := ioutils.HashData(bytes.NewReader(resolv))
if err != nil {
return nil, err
}
return &File{Content: resolv, Hash: hash}, nil
} | [
"func",
"GetSpecific",
"(",
"path",
"string",
")",
"(",
"*",
"File",
",",
"error",
")",
"{",
"resolv",
",",
"err",
":=",
"ioutil",
".",
"ReadFile",
"(",
"path",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"hash",
",",
"err",
":=",
"ioutils",
".",
"HashData",
"(",
"bytes",
".",
"NewReader",
"(",
"resolv",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"&",
"File",
"{",
"Content",
":",
"resolv",
",",
"Hash",
":",
"hash",
"}",
",",
"nil",
"\n",
"}"
] | // GetSpecific returns the contents of the user specified resolv.conf file and its hash | [
"GetSpecific",
"returns",
"the",
"contents",
"of",
"the",
"user",
"specified",
"resolv",
".",
"conf",
"file",
"and",
"its",
"hash"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/resolvconf/resolvconf.go#L62-L72 | train |
docker/libnetwork | resolvconf/resolvconf.go | GetLastModified | func GetLastModified() *File {
lastModified.Lock()
defer lastModified.Unlock()
return &File{Content: lastModified.contents, Hash: lastModified.sha256}
} | go | func GetLastModified() *File {
lastModified.Lock()
defer lastModified.Unlock()
return &File{Content: lastModified.contents, Hash: lastModified.sha256}
} | [
"func",
"GetLastModified",
"(",
")",
"*",
"File",
"{",
"lastModified",
".",
"Lock",
"(",
")",
"\n",
"defer",
"lastModified",
".",
"Unlock",
"(",
")",
"\n\n",
"return",
"&",
"File",
"{",
"Content",
":",
"lastModified",
".",
"contents",
",",
"Hash",
":",
"lastModified",
".",
"sha256",
"}",
"\n",
"}"
] | // GetLastModified retrieves the last used contents and hash of the host resolv.conf.
// Used by containers updating on restart | [
"GetLastModified",
"retrieves",
"the",
"last",
"used",
"contents",
"and",
"hash",
"of",
"the",
"host",
"resolv",
".",
"conf",
".",
"Used",
"by",
"containers",
"updating",
"on",
"restart"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/resolvconf/resolvconf.go#L100-L105 | train |
docker/libnetwork | resolvconf/resolvconf.go | getLines | func getLines(input []byte, commentMarker []byte) [][]byte {
lines := bytes.Split(input, []byte("\n"))
var output [][]byte
for _, currentLine := range lines {
var commentIndex = bytes.Index(currentLine, commentMarker)
if commentIndex == -1 {
output = append(output, currentLine)
} else {
output = append(output, currentLine[:commentIndex])
}
}
return output
} | go | func getLines(input []byte, commentMarker []byte) [][]byte {
lines := bytes.Split(input, []byte("\n"))
var output [][]byte
for _, currentLine := range lines {
var commentIndex = bytes.Index(currentLine, commentMarker)
if commentIndex == -1 {
output = append(output, currentLine)
} else {
output = append(output, currentLine[:commentIndex])
}
}
return output
} | [
"func",
"getLines",
"(",
"input",
"[",
"]",
"byte",
",",
"commentMarker",
"[",
"]",
"byte",
")",
"[",
"]",
"[",
"]",
"byte",
"{",
"lines",
":=",
"bytes",
".",
"Split",
"(",
"input",
",",
"[",
"]",
"byte",
"(",
"\"",
"\\n",
"\"",
")",
")",
"\n",
"var",
"output",
"[",
"]",
"[",
"]",
"byte",
"\n",
"for",
"_",
",",
"currentLine",
":=",
"range",
"lines",
"{",
"var",
"commentIndex",
"=",
"bytes",
".",
"Index",
"(",
"currentLine",
",",
"commentMarker",
")",
"\n",
"if",
"commentIndex",
"==",
"-",
"1",
"{",
"output",
"=",
"append",
"(",
"output",
",",
"currentLine",
")",
"\n",
"}",
"else",
"{",
"output",
"=",
"append",
"(",
"output",
",",
"currentLine",
"[",
":",
"commentIndex",
"]",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"output",
"\n",
"}"
] | // getLines parses input into lines and strips away comments. | [
"getLines",
"parses",
"input",
"into",
"lines",
"and",
"strips",
"away",
"comments",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/resolvconf/resolvconf.go#L139-L151 | train |
docker/libnetwork | resolvconf/resolvconf.go | Build | func Build(path string, dns, dnsSearch, dnsOptions []string) (*File, error) {
content := bytes.NewBuffer(nil)
if len(dnsSearch) > 0 {
if searchString := strings.Join(dnsSearch, " "); strings.Trim(searchString, " ") != "." {
if _, err := content.WriteString("search " + searchString + "\n"); err != nil {
return nil, err
}
}
}
for _, dns := range dns {
if _, err := content.WriteString("nameserver " + dns + "\n"); err != nil {
return nil, err
}
}
if len(dnsOptions) > 0 {
if optsString := strings.Join(dnsOptions, " "); strings.Trim(optsString, " ") != "" {
if _, err := content.WriteString("options " + optsString + "\n"); err != nil {
return nil, err
}
}
}
hash, err := ioutils.HashData(bytes.NewReader(content.Bytes()))
if err != nil {
return nil, err
}
return &File{Content: content.Bytes(), Hash: hash}, ioutil.WriteFile(path, content.Bytes(), 0644)
} | go | func Build(path string, dns, dnsSearch, dnsOptions []string) (*File, error) {
content := bytes.NewBuffer(nil)
if len(dnsSearch) > 0 {
if searchString := strings.Join(dnsSearch, " "); strings.Trim(searchString, " ") != "." {
if _, err := content.WriteString("search " + searchString + "\n"); err != nil {
return nil, err
}
}
}
for _, dns := range dns {
if _, err := content.WriteString("nameserver " + dns + "\n"); err != nil {
return nil, err
}
}
if len(dnsOptions) > 0 {
if optsString := strings.Join(dnsOptions, " "); strings.Trim(optsString, " ") != "" {
if _, err := content.WriteString("options " + optsString + "\n"); err != nil {
return nil, err
}
}
}
hash, err := ioutils.HashData(bytes.NewReader(content.Bytes()))
if err != nil {
return nil, err
}
return &File{Content: content.Bytes(), Hash: hash}, ioutil.WriteFile(path, content.Bytes(), 0644)
} | [
"func",
"Build",
"(",
"path",
"string",
",",
"dns",
",",
"dnsSearch",
",",
"dnsOptions",
"[",
"]",
"string",
")",
"(",
"*",
"File",
",",
"error",
")",
"{",
"content",
":=",
"bytes",
".",
"NewBuffer",
"(",
"nil",
")",
"\n",
"if",
"len",
"(",
"dnsSearch",
")",
">",
"0",
"{",
"if",
"searchString",
":=",
"strings",
".",
"Join",
"(",
"dnsSearch",
",",
"\"",
"\"",
")",
";",
"strings",
".",
"Trim",
"(",
"searchString",
",",
"\"",
"\"",
")",
"!=",
"\"",
"\"",
"{",
"if",
"_",
",",
"err",
":=",
"content",
".",
"WriteString",
"(",
"\"",
"\"",
"+",
"searchString",
"+",
"\"",
"\\n",
"\"",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"for",
"_",
",",
"dns",
":=",
"range",
"dns",
"{",
"if",
"_",
",",
"err",
":=",
"content",
".",
"WriteString",
"(",
"\"",
"\"",
"+",
"dns",
"+",
"\"",
"\\n",
"\"",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"len",
"(",
"dnsOptions",
")",
">",
"0",
"{",
"if",
"optsString",
":=",
"strings",
".",
"Join",
"(",
"dnsOptions",
",",
"\"",
"\"",
")",
";",
"strings",
".",
"Trim",
"(",
"optsString",
",",
"\"",
"\"",
")",
"!=",
"\"",
"\"",
"{",
"if",
"_",
",",
"err",
":=",
"content",
".",
"WriteString",
"(",
"\"",
"\"",
"+",
"optsString",
"+",
"\"",
"\\n",
"\"",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n\n",
"hash",
",",
"err",
":=",
"ioutils",
".",
"HashData",
"(",
"bytes",
".",
"NewReader",
"(",
"content",
".",
"Bytes",
"(",
")",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"&",
"File",
"{",
"Content",
":",
"content",
".",
"Bytes",
"(",
")",
",",
"Hash",
":",
"hash",
"}",
",",
"ioutil",
".",
"WriteFile",
"(",
"path",
",",
"content",
".",
"Bytes",
"(",
")",
",",
"0644",
")",
"\n",
"}"
] | // Build writes a configuration file to path containing a "nameserver" entry
// for every element in dns, a "search" entry for every element in
// dnsSearch, and an "options" entry for every element in dnsOptions. | [
"Build",
"writes",
"a",
"configuration",
"file",
"to",
"path",
"containing",
"a",
"nameserver",
"entry",
"for",
"every",
"element",
"in",
"dns",
"a",
"search",
"entry",
"for",
"every",
"element",
"in",
"dnsSearch",
"and",
"an",
"options",
"entry",
"for",
"every",
"element",
"in",
"dnsOptions",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/resolvconf/resolvconf.go#L223-L251 | train |
docker/libnetwork | ipam/allocator.go | NewAllocator | func NewAllocator(lcDs, glDs datastore.DataStore) (*Allocator, error) {
a := &Allocator{}
// Load predefined subnet pools
a.predefined = map[string][]*net.IPNet{
localAddressSpace: ipamutils.GetLocalScopeDefaultNetworks(),
globalAddressSpace: ipamutils.GetGlobalScopeDefaultNetworks(),
}
// Initialize asIndices map
a.predefinedStartIndices = make(map[string]int)
// Initialize bitseq map
a.addresses = make(map[SubnetKey]*bitseq.Handle)
// Initialize address spaces
a.addrSpaces = make(map[string]*addrSpace)
for _, aspc := range []struct {
as string
ds datastore.DataStore
}{
{localAddressSpace, lcDs},
{globalAddressSpace, glDs},
} {
a.initializeAddressSpace(aspc.as, aspc.ds)
}
return a, nil
} | go | func NewAllocator(lcDs, glDs datastore.DataStore) (*Allocator, error) {
a := &Allocator{}
// Load predefined subnet pools
a.predefined = map[string][]*net.IPNet{
localAddressSpace: ipamutils.GetLocalScopeDefaultNetworks(),
globalAddressSpace: ipamutils.GetGlobalScopeDefaultNetworks(),
}
// Initialize asIndices map
a.predefinedStartIndices = make(map[string]int)
// Initialize bitseq map
a.addresses = make(map[SubnetKey]*bitseq.Handle)
// Initialize address spaces
a.addrSpaces = make(map[string]*addrSpace)
for _, aspc := range []struct {
as string
ds datastore.DataStore
}{
{localAddressSpace, lcDs},
{globalAddressSpace, glDs},
} {
a.initializeAddressSpace(aspc.as, aspc.ds)
}
return a, nil
} | [
"func",
"NewAllocator",
"(",
"lcDs",
",",
"glDs",
"datastore",
".",
"DataStore",
")",
"(",
"*",
"Allocator",
",",
"error",
")",
"{",
"a",
":=",
"&",
"Allocator",
"{",
"}",
"\n\n",
"// Load predefined subnet pools",
"a",
".",
"predefined",
"=",
"map",
"[",
"string",
"]",
"[",
"]",
"*",
"net",
".",
"IPNet",
"{",
"localAddressSpace",
":",
"ipamutils",
".",
"GetLocalScopeDefaultNetworks",
"(",
")",
",",
"globalAddressSpace",
":",
"ipamutils",
".",
"GetGlobalScopeDefaultNetworks",
"(",
")",
",",
"}",
"\n\n",
"// Initialize asIndices map",
"a",
".",
"predefinedStartIndices",
"=",
"make",
"(",
"map",
"[",
"string",
"]",
"int",
")",
"\n\n",
"// Initialize bitseq map",
"a",
".",
"addresses",
"=",
"make",
"(",
"map",
"[",
"SubnetKey",
"]",
"*",
"bitseq",
".",
"Handle",
")",
"\n\n",
"// Initialize address spaces",
"a",
".",
"addrSpaces",
"=",
"make",
"(",
"map",
"[",
"string",
"]",
"*",
"addrSpace",
")",
"\n",
"for",
"_",
",",
"aspc",
":=",
"range",
"[",
"]",
"struct",
"{",
"as",
"string",
"\n",
"ds",
"datastore",
".",
"DataStore",
"\n",
"}",
"{",
"{",
"localAddressSpace",
",",
"lcDs",
"}",
",",
"{",
"globalAddressSpace",
",",
"glDs",
"}",
",",
"}",
"{",
"a",
".",
"initializeAddressSpace",
"(",
"aspc",
".",
"as",
",",
"aspc",
".",
"ds",
")",
"\n",
"}",
"\n\n",
"return",
"a",
",",
"nil",
"\n",
"}"
] | // NewAllocator returns an instance of libnetwork ipam | [
"NewAllocator",
"returns",
"an",
"instance",
"of",
"libnetwork",
"ipam"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipam/allocator.go#L44-L73 | train |
docker/libnetwork | ipam/allocator.go | checkConsistency | func (a *Allocator) checkConsistency(as string) {
var sKeyList []SubnetKey
// Retrieve this address space's configuration and bitmasks from the datastore
a.refresh(as)
a.Lock()
aSpace, ok := a.addrSpaces[as]
a.Unlock()
if !ok {
return
}
a.updateBitMasks(aSpace)
aSpace.Lock()
for sk, pd := range aSpace.subnets {
if pd.Range != nil {
continue
}
sKeyList = append(sKeyList, sk)
}
aSpace.Unlock()
for _, sk := range sKeyList {
a.Lock()
bm := a.addresses[sk]
a.Unlock()
if err := bm.CheckConsistency(); err != nil {
logrus.Warnf("Error while running consistency check for %s: %v", sk, err)
}
}
} | go | func (a *Allocator) checkConsistency(as string) {
var sKeyList []SubnetKey
// Retrieve this address space's configuration and bitmasks from the datastore
a.refresh(as)
a.Lock()
aSpace, ok := a.addrSpaces[as]
a.Unlock()
if !ok {
return
}
a.updateBitMasks(aSpace)
aSpace.Lock()
for sk, pd := range aSpace.subnets {
if pd.Range != nil {
continue
}
sKeyList = append(sKeyList, sk)
}
aSpace.Unlock()
for _, sk := range sKeyList {
a.Lock()
bm := a.addresses[sk]
a.Unlock()
if err := bm.CheckConsistency(); err != nil {
logrus.Warnf("Error while running consistency check for %s: %v", sk, err)
}
}
} | [
"func",
"(",
"a",
"*",
"Allocator",
")",
"checkConsistency",
"(",
"as",
"string",
")",
"{",
"var",
"sKeyList",
"[",
"]",
"SubnetKey",
"\n\n",
"// Retrieve this address space's configuration and bitmasks from the datastore",
"a",
".",
"refresh",
"(",
"as",
")",
"\n",
"a",
".",
"Lock",
"(",
")",
"\n",
"aSpace",
",",
"ok",
":=",
"a",
".",
"addrSpaces",
"[",
"as",
"]",
"\n",
"a",
".",
"Unlock",
"(",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"\n",
"}",
"\n",
"a",
".",
"updateBitMasks",
"(",
"aSpace",
")",
"\n\n",
"aSpace",
".",
"Lock",
"(",
")",
"\n",
"for",
"sk",
",",
"pd",
":=",
"range",
"aSpace",
".",
"subnets",
"{",
"if",
"pd",
".",
"Range",
"!=",
"nil",
"{",
"continue",
"\n",
"}",
"\n",
"sKeyList",
"=",
"append",
"(",
"sKeyList",
",",
"sk",
")",
"\n",
"}",
"\n",
"aSpace",
".",
"Unlock",
"(",
")",
"\n\n",
"for",
"_",
",",
"sk",
":=",
"range",
"sKeyList",
"{",
"a",
".",
"Lock",
"(",
")",
"\n",
"bm",
":=",
"a",
".",
"addresses",
"[",
"sk",
"]",
"\n",
"a",
".",
"Unlock",
"(",
")",
"\n",
"if",
"err",
":=",
"bm",
".",
"CheckConsistency",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Warnf",
"(",
"\"",
"\"",
",",
"sk",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // Checks for and fixes damaged bitmask. | [
"Checks",
"for",
"and",
"fixes",
"damaged",
"bitmask",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipam/allocator.go#L118-L148 | train |
docker/libnetwork | ipam/allocator.go | DiscoverNew | func (a *Allocator) DiscoverNew(dType discoverapi.DiscoveryType, data interface{}) error {
if dType != discoverapi.DatastoreConfig {
return nil
}
dsc, ok := data.(discoverapi.DatastoreConfigData)
if !ok {
return types.InternalErrorf("incorrect data in datastore update notification: %v", data)
}
ds, err := datastore.NewDataStoreFromConfig(dsc)
if err != nil {
return err
}
return a.initializeAddressSpace(globalAddressSpace, ds)
} | go | func (a *Allocator) DiscoverNew(dType discoverapi.DiscoveryType, data interface{}) error {
if dType != discoverapi.DatastoreConfig {
return nil
}
dsc, ok := data.(discoverapi.DatastoreConfigData)
if !ok {
return types.InternalErrorf("incorrect data in datastore update notification: %v", data)
}
ds, err := datastore.NewDataStoreFromConfig(dsc)
if err != nil {
return err
}
return a.initializeAddressSpace(globalAddressSpace, ds)
} | [
"func",
"(",
"a",
"*",
"Allocator",
")",
"DiscoverNew",
"(",
"dType",
"discoverapi",
".",
"DiscoveryType",
",",
"data",
"interface",
"{",
"}",
")",
"error",
"{",
"if",
"dType",
"!=",
"discoverapi",
".",
"DatastoreConfig",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"dsc",
",",
"ok",
":=",
"data",
".",
"(",
"discoverapi",
".",
"DatastoreConfigData",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"types",
".",
"InternalErrorf",
"(",
"\"",
"\"",
",",
"data",
")",
"\n",
"}",
"\n\n",
"ds",
",",
"err",
":=",
"datastore",
".",
"NewDataStoreFromConfig",
"(",
"dsc",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"return",
"a",
".",
"initializeAddressSpace",
"(",
"globalAddressSpace",
",",
"ds",
")",
"\n",
"}"
] | // DiscoverNew informs the allocator about a new global scope datastore | [
"DiscoverNew",
"informs",
"the",
"allocator",
"about",
"a",
"new",
"global",
"scope",
"datastore"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipam/allocator.go#L178-L194 | train |
docker/libnetwork | ipam/allocator.go | RequestPool | func (a *Allocator) RequestPool(addressSpace, pool, subPool string, options map[string]string, v6 bool) (string, *net.IPNet, map[string]string, error) {
logrus.Debugf("RequestPool(%s, %s, %s, %v, %t)", addressSpace, pool, subPool, options, v6)
k, nw, ipr, err := a.parsePoolRequest(addressSpace, pool, subPool, v6)
if err != nil {
return "", nil, nil, types.InternalErrorf("failed to parse pool request for address space %q pool %q subpool %q: %v", addressSpace, pool, subPool, err)
}
pdf := k == nil
retry:
if pdf {
if nw, err = a.getPredefinedPool(addressSpace, v6); err != nil {
return "", nil, nil, err
}
k = &SubnetKey{AddressSpace: addressSpace, Subnet: nw.String()}
}
if err := a.refresh(addressSpace); err != nil {
return "", nil, nil, err
}
aSpace, err := a.getAddrSpace(addressSpace)
if err != nil {
return "", nil, nil, err
}
insert, err := aSpace.updatePoolDBOnAdd(*k, nw, ipr, pdf)
if err != nil {
if _, ok := err.(types.MaskableError); ok {
logrus.Debugf("Retrying predefined pool search: %v", err)
goto retry
}
return "", nil, nil, err
}
if err := a.writeToStore(aSpace); err != nil {
if _, ok := err.(types.RetryError); !ok {
return "", nil, nil, types.InternalErrorf("pool configuration failed because of %s", err.Error())
}
goto retry
}
return k.String(), nw, nil, insert()
} | go | func (a *Allocator) RequestPool(addressSpace, pool, subPool string, options map[string]string, v6 bool) (string, *net.IPNet, map[string]string, error) {
logrus.Debugf("RequestPool(%s, %s, %s, %v, %t)", addressSpace, pool, subPool, options, v6)
k, nw, ipr, err := a.parsePoolRequest(addressSpace, pool, subPool, v6)
if err != nil {
return "", nil, nil, types.InternalErrorf("failed to parse pool request for address space %q pool %q subpool %q: %v", addressSpace, pool, subPool, err)
}
pdf := k == nil
retry:
if pdf {
if nw, err = a.getPredefinedPool(addressSpace, v6); err != nil {
return "", nil, nil, err
}
k = &SubnetKey{AddressSpace: addressSpace, Subnet: nw.String()}
}
if err := a.refresh(addressSpace); err != nil {
return "", nil, nil, err
}
aSpace, err := a.getAddrSpace(addressSpace)
if err != nil {
return "", nil, nil, err
}
insert, err := aSpace.updatePoolDBOnAdd(*k, nw, ipr, pdf)
if err != nil {
if _, ok := err.(types.MaskableError); ok {
logrus.Debugf("Retrying predefined pool search: %v", err)
goto retry
}
return "", nil, nil, err
}
if err := a.writeToStore(aSpace); err != nil {
if _, ok := err.(types.RetryError); !ok {
return "", nil, nil, types.InternalErrorf("pool configuration failed because of %s", err.Error())
}
goto retry
}
return k.String(), nw, nil, insert()
} | [
"func",
"(",
"a",
"*",
"Allocator",
")",
"RequestPool",
"(",
"addressSpace",
",",
"pool",
",",
"subPool",
"string",
",",
"options",
"map",
"[",
"string",
"]",
"string",
",",
"v6",
"bool",
")",
"(",
"string",
",",
"*",
"net",
".",
"IPNet",
",",
"map",
"[",
"string",
"]",
"string",
",",
"error",
")",
"{",
"logrus",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"addressSpace",
",",
"pool",
",",
"subPool",
",",
"options",
",",
"v6",
")",
"\n\n",
"k",
",",
"nw",
",",
"ipr",
",",
"err",
":=",
"a",
".",
"parsePoolRequest",
"(",
"addressSpace",
",",
"pool",
",",
"subPool",
",",
"v6",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"nil",
",",
"nil",
",",
"types",
".",
"InternalErrorf",
"(",
"\"",
"\"",
",",
"addressSpace",
",",
"pool",
",",
"subPool",
",",
"err",
")",
"\n",
"}",
"\n\n",
"pdf",
":=",
"k",
"==",
"nil",
"\n\n",
"retry",
":",
"if",
"pdf",
"{",
"if",
"nw",
",",
"err",
"=",
"a",
".",
"getPredefinedPool",
"(",
"addressSpace",
",",
"v6",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"k",
"=",
"&",
"SubnetKey",
"{",
"AddressSpace",
":",
"addressSpace",
",",
"Subnet",
":",
"nw",
".",
"String",
"(",
")",
"}",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"a",
".",
"refresh",
"(",
"addressSpace",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"aSpace",
",",
"err",
":=",
"a",
".",
"getAddrSpace",
"(",
"addressSpace",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"insert",
",",
"err",
":=",
"aSpace",
".",
"updatePoolDBOnAdd",
"(",
"*",
"k",
",",
"nw",
",",
"ipr",
",",
"pdf",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"_",
",",
"ok",
":=",
"err",
".",
"(",
"types",
".",
"MaskableError",
")",
";",
"ok",
"{",
"logrus",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"goto",
"retry",
"\n",
"}",
"\n",
"return",
"\"",
"\"",
",",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"a",
".",
"writeToStore",
"(",
"aSpace",
")",
";",
"err",
"!=",
"nil",
"{",
"if",
"_",
",",
"ok",
":=",
"err",
".",
"(",
"types",
".",
"RetryError",
")",
";",
"!",
"ok",
"{",
"return",
"\"",
"\"",
",",
"nil",
",",
"nil",
",",
"types",
".",
"InternalErrorf",
"(",
"\"",
"\"",
",",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n\n",
"goto",
"retry",
"\n",
"}",
"\n\n",
"return",
"k",
".",
"String",
"(",
")",
",",
"nw",
",",
"nil",
",",
"insert",
"(",
")",
"\n",
"}"
] | // RequestPool returns an address pool along with its unique id.
// addressSpace must be a valid address space name and must not be the empty string.
// If pool is the empty string then the default predefined pool for addressSpace will be used, otherwise pool must be a valid IP address and length in CIDR notation.
// If subPool is not empty, it must be a valid IP address and length in CIDR notation which is a sub-range of pool.
// subPool must be empty if pool is empty. | [
"RequestPool",
"returns",
"an",
"address",
"pool",
"along",
"with",
"its",
"unique",
"id",
".",
"addressSpace",
"must",
"be",
"a",
"valid",
"address",
"space",
"name",
"and",
"must",
"not",
"be",
"the",
"empty",
"string",
".",
"If",
"pool",
"is",
"the",
"empty",
"string",
"then",
"the",
"default",
"predefined",
"pool",
"for",
"addressSpace",
"will",
"be",
"used",
"otherwise",
"pool",
"must",
"be",
"a",
"valid",
"IP",
"address",
"and",
"length",
"in",
"CIDR",
"notation",
".",
"If",
"subPool",
"is",
"not",
"empty",
"it",
"must",
"be",
"a",
"valid",
"IP",
"address",
"and",
"length",
"in",
"CIDR",
"notation",
"which",
"is",
"a",
"sub",
"-",
"range",
"of",
"pool",
".",
"subPool",
"must",
"be",
"empty",
"if",
"pool",
"is",
"empty",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipam/allocator.go#L211-L256 | train |
docker/libnetwork | ipam/allocator.go | ReleasePool | func (a *Allocator) ReleasePool(poolID string) error {
logrus.Debugf("ReleasePool(%s)", poolID)
k := SubnetKey{}
if err := k.FromString(poolID); err != nil {
return types.BadRequestErrorf("invalid pool id: %s", poolID)
}
retry:
if err := a.refresh(k.AddressSpace); err != nil {
return err
}
aSpace, err := a.getAddrSpace(k.AddressSpace)
if err != nil {
return err
}
remove, err := aSpace.updatePoolDBOnRemoval(k)
if err != nil {
return err
}
if err = a.writeToStore(aSpace); err != nil {
if _, ok := err.(types.RetryError); !ok {
return types.InternalErrorf("pool (%s) removal failed because of %v", poolID, err)
}
goto retry
}
return remove()
} | go | func (a *Allocator) ReleasePool(poolID string) error {
logrus.Debugf("ReleasePool(%s)", poolID)
k := SubnetKey{}
if err := k.FromString(poolID); err != nil {
return types.BadRequestErrorf("invalid pool id: %s", poolID)
}
retry:
if err := a.refresh(k.AddressSpace); err != nil {
return err
}
aSpace, err := a.getAddrSpace(k.AddressSpace)
if err != nil {
return err
}
remove, err := aSpace.updatePoolDBOnRemoval(k)
if err != nil {
return err
}
if err = a.writeToStore(aSpace); err != nil {
if _, ok := err.(types.RetryError); !ok {
return types.InternalErrorf("pool (%s) removal failed because of %v", poolID, err)
}
goto retry
}
return remove()
} | [
"func",
"(",
"a",
"*",
"Allocator",
")",
"ReleasePool",
"(",
"poolID",
"string",
")",
"error",
"{",
"logrus",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"poolID",
")",
"\n",
"k",
":=",
"SubnetKey",
"{",
"}",
"\n",
"if",
"err",
":=",
"k",
".",
"FromString",
"(",
"poolID",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"types",
".",
"BadRequestErrorf",
"(",
"\"",
"\"",
",",
"poolID",
")",
"\n",
"}",
"\n\n",
"retry",
":",
"if",
"err",
":=",
"a",
".",
"refresh",
"(",
"k",
".",
"AddressSpace",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"aSpace",
",",
"err",
":=",
"a",
".",
"getAddrSpace",
"(",
"k",
".",
"AddressSpace",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"remove",
",",
"err",
":=",
"aSpace",
".",
"updatePoolDBOnRemoval",
"(",
"k",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"if",
"err",
"=",
"a",
".",
"writeToStore",
"(",
"aSpace",
")",
";",
"err",
"!=",
"nil",
"{",
"if",
"_",
",",
"ok",
":=",
"err",
".",
"(",
"types",
".",
"RetryError",
")",
";",
"!",
"ok",
"{",
"return",
"types",
".",
"InternalErrorf",
"(",
"\"",
"\"",
",",
"poolID",
",",
"err",
")",
"\n",
"}",
"\n",
"goto",
"retry",
"\n",
"}",
"\n\n",
"return",
"remove",
"(",
")",
"\n",
"}"
] | // ReleasePool releases the address pool identified by the passed id | [
"ReleasePool",
"releases",
"the",
"address",
"pool",
"identified",
"by",
"the",
"passed",
"id"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipam/allocator.go#L259-L289 | train |
docker/libnetwork | ipam/allocator.go | getAddrSpace | func (a *Allocator) getAddrSpace(as string) (*addrSpace, error) {
a.Lock()
defer a.Unlock()
aSpace, ok := a.addrSpaces[as]
if !ok {
return nil, types.BadRequestErrorf("cannot find address space %s (most likely the backing datastore is not configured)", as)
}
return aSpace, nil
} | go | func (a *Allocator) getAddrSpace(as string) (*addrSpace, error) {
a.Lock()
defer a.Unlock()
aSpace, ok := a.addrSpaces[as]
if !ok {
return nil, types.BadRequestErrorf("cannot find address space %s (most likely the backing datastore is not configured)", as)
}
return aSpace, nil
} | [
"func",
"(",
"a",
"*",
"Allocator",
")",
"getAddrSpace",
"(",
"as",
"string",
")",
"(",
"*",
"addrSpace",
",",
"error",
")",
"{",
"a",
".",
"Lock",
"(",
")",
"\n",
"defer",
"a",
".",
"Unlock",
"(",
")",
"\n",
"aSpace",
",",
"ok",
":=",
"a",
".",
"addrSpaces",
"[",
"as",
"]",
"\n",
"if",
"!",
"ok",
"{",
"return",
"nil",
",",
"types",
".",
"BadRequestErrorf",
"(",
"\"",
"\"",
",",
"as",
")",
"\n",
"}",
"\n",
"return",
"aSpace",
",",
"nil",
"\n",
"}"
] | // Given the address space, returns the local or global PoolConfig based on whether the
// address space is local or global. AddressSpace locality is registered with IPAM out of band. | [
"Given",
"the",
"address",
"space",
"returns",
"the",
"local",
"or",
"global",
"PoolConfig",
"based",
"on",
"whether",
"the",
"address",
"space",
"is",
"local",
"or",
"global",
".",
"AddressSpace",
"locality",
"is",
"registered",
"with",
"IPAM",
"out",
"of",
"band",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipam/allocator.go#L293-L301 | train |
docker/libnetwork | ipam/allocator.go | parsePoolRequest | func (a *Allocator) parsePoolRequest(addressSpace, pool, subPool string, v6 bool) (*SubnetKey, *net.IPNet, *AddressRange, error) {
var (
nw *net.IPNet
ipr *AddressRange
err error
)
if addressSpace == "" {
return nil, nil, nil, ipamapi.ErrInvalidAddressSpace
}
if pool == "" && subPool != "" {
return nil, nil, nil, ipamapi.ErrInvalidSubPool
}
if pool == "" {
return nil, nil, nil, nil
}
if _, nw, err = net.ParseCIDR(pool); err != nil {
return nil, nil, nil, ipamapi.ErrInvalidPool
}
if subPool != "" {
if ipr, err = getAddressRange(subPool, nw); err != nil {
return nil, nil, nil, err
}
}
return &SubnetKey{AddressSpace: addressSpace, Subnet: nw.String(), ChildSubnet: subPool}, nw, ipr, nil
} | go | func (a *Allocator) parsePoolRequest(addressSpace, pool, subPool string, v6 bool) (*SubnetKey, *net.IPNet, *AddressRange, error) {
var (
nw *net.IPNet
ipr *AddressRange
err error
)
if addressSpace == "" {
return nil, nil, nil, ipamapi.ErrInvalidAddressSpace
}
if pool == "" && subPool != "" {
return nil, nil, nil, ipamapi.ErrInvalidSubPool
}
if pool == "" {
return nil, nil, nil, nil
}
if _, nw, err = net.ParseCIDR(pool); err != nil {
return nil, nil, nil, ipamapi.ErrInvalidPool
}
if subPool != "" {
if ipr, err = getAddressRange(subPool, nw); err != nil {
return nil, nil, nil, err
}
}
return &SubnetKey{AddressSpace: addressSpace, Subnet: nw.String(), ChildSubnet: subPool}, nw, ipr, nil
} | [
"func",
"(",
"a",
"*",
"Allocator",
")",
"parsePoolRequest",
"(",
"addressSpace",
",",
"pool",
",",
"subPool",
"string",
",",
"v6",
"bool",
")",
"(",
"*",
"SubnetKey",
",",
"*",
"net",
".",
"IPNet",
",",
"*",
"AddressRange",
",",
"error",
")",
"{",
"var",
"(",
"nw",
"*",
"net",
".",
"IPNet",
"\n",
"ipr",
"*",
"AddressRange",
"\n",
"err",
"error",
"\n",
")",
"\n\n",
"if",
"addressSpace",
"==",
"\"",
"\"",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"ipamapi",
".",
"ErrInvalidAddressSpace",
"\n",
"}",
"\n\n",
"if",
"pool",
"==",
"\"",
"\"",
"&&",
"subPool",
"!=",
"\"",
"\"",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"ipamapi",
".",
"ErrInvalidSubPool",
"\n",
"}",
"\n\n",
"if",
"pool",
"==",
"\"",
"\"",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"nil",
"\n",
"}",
"\n\n",
"if",
"_",
",",
"nw",
",",
"err",
"=",
"net",
".",
"ParseCIDR",
"(",
"pool",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"ipamapi",
".",
"ErrInvalidPool",
"\n",
"}",
"\n\n",
"if",
"subPool",
"!=",
"\"",
"\"",
"{",
"if",
"ipr",
",",
"err",
"=",
"getAddressRange",
"(",
"subPool",
",",
"nw",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"&",
"SubnetKey",
"{",
"AddressSpace",
":",
"addressSpace",
",",
"Subnet",
":",
"nw",
".",
"String",
"(",
")",
",",
"ChildSubnet",
":",
"subPool",
"}",
",",
"nw",
",",
"ipr",
",",
"nil",
"\n",
"}"
] | // parsePoolRequest parses and validates a request to create a new pool under addressSpace and returns
// a SubnetKey, network and range describing the request. | [
"parsePoolRequest",
"parses",
"and",
"validates",
"a",
"request",
"to",
"create",
"a",
"new",
"pool",
"under",
"addressSpace",
"and",
"returns",
"a",
"SubnetKey",
"network",
"and",
"range",
"describing",
"the",
"request",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipam/allocator.go#L305-L335 | train |
docker/libnetwork | ipam/allocator.go | RequestAddress | func (a *Allocator) RequestAddress(poolID string, prefAddress net.IP, opts map[string]string) (*net.IPNet, map[string]string, error) {
logrus.Debugf("RequestAddress(%s, %v, %v)", poolID, prefAddress, opts)
k := SubnetKey{}
if err := k.FromString(poolID); err != nil {
return nil, nil, types.BadRequestErrorf("invalid pool id: %s", poolID)
}
if err := a.refresh(k.AddressSpace); err != nil {
return nil, nil, err
}
aSpace, err := a.getAddrSpace(k.AddressSpace)
if err != nil {
return nil, nil, err
}
aSpace.Lock()
p, ok := aSpace.subnets[k]
if !ok {
aSpace.Unlock()
return nil, nil, types.NotFoundErrorf("cannot find address pool for poolID:%s", poolID)
}
if prefAddress != nil && !p.Pool.Contains(prefAddress) {
aSpace.Unlock()
return nil, nil, ipamapi.ErrIPOutOfRange
}
c := p
for c.Range != nil {
k = c.ParentKey
c = aSpace.subnets[k]
}
aSpace.Unlock()
bm, err := a.retrieveBitmask(k, c.Pool)
if err != nil {
return nil, nil, types.InternalErrorf("could not find bitmask in datastore for %s on address %v request from pool %s: %v",
k.String(), prefAddress, poolID, err)
}
// In order to request for a serial ip address allocation, callers can pass in the option to request
// IP allocation serially or first available IP in the subnet
var serial bool
if opts != nil {
if val, ok := opts[ipamapi.AllocSerialPrefix]; ok {
serial = (val == "true")
}
}
ip, err := a.getAddress(p.Pool, bm, prefAddress, p.Range, serial)
if err != nil {
return nil, nil, err
}
return &net.IPNet{IP: ip, Mask: p.Pool.Mask}, nil, nil
} | go | func (a *Allocator) RequestAddress(poolID string, prefAddress net.IP, opts map[string]string) (*net.IPNet, map[string]string, error) {
logrus.Debugf("RequestAddress(%s, %v, %v)", poolID, prefAddress, opts)
k := SubnetKey{}
if err := k.FromString(poolID); err != nil {
return nil, nil, types.BadRequestErrorf("invalid pool id: %s", poolID)
}
if err := a.refresh(k.AddressSpace); err != nil {
return nil, nil, err
}
aSpace, err := a.getAddrSpace(k.AddressSpace)
if err != nil {
return nil, nil, err
}
aSpace.Lock()
p, ok := aSpace.subnets[k]
if !ok {
aSpace.Unlock()
return nil, nil, types.NotFoundErrorf("cannot find address pool for poolID:%s", poolID)
}
if prefAddress != nil && !p.Pool.Contains(prefAddress) {
aSpace.Unlock()
return nil, nil, ipamapi.ErrIPOutOfRange
}
c := p
for c.Range != nil {
k = c.ParentKey
c = aSpace.subnets[k]
}
aSpace.Unlock()
bm, err := a.retrieveBitmask(k, c.Pool)
if err != nil {
return nil, nil, types.InternalErrorf("could not find bitmask in datastore for %s on address %v request from pool %s: %v",
k.String(), prefAddress, poolID, err)
}
// In order to request for a serial ip address allocation, callers can pass in the option to request
// IP allocation serially or first available IP in the subnet
var serial bool
if opts != nil {
if val, ok := opts[ipamapi.AllocSerialPrefix]; ok {
serial = (val == "true")
}
}
ip, err := a.getAddress(p.Pool, bm, prefAddress, p.Range, serial)
if err != nil {
return nil, nil, err
}
return &net.IPNet{IP: ip, Mask: p.Pool.Mask}, nil, nil
} | [
"func",
"(",
"a",
"*",
"Allocator",
")",
"RequestAddress",
"(",
"poolID",
"string",
",",
"prefAddress",
"net",
".",
"IP",
",",
"opts",
"map",
"[",
"string",
"]",
"string",
")",
"(",
"*",
"net",
".",
"IPNet",
",",
"map",
"[",
"string",
"]",
"string",
",",
"error",
")",
"{",
"logrus",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"poolID",
",",
"prefAddress",
",",
"opts",
")",
"\n",
"k",
":=",
"SubnetKey",
"{",
"}",
"\n",
"if",
"err",
":=",
"k",
".",
"FromString",
"(",
"poolID",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"types",
".",
"BadRequestErrorf",
"(",
"\"",
"\"",
",",
"poolID",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"a",
".",
"refresh",
"(",
"k",
".",
"AddressSpace",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"aSpace",
",",
"err",
":=",
"a",
".",
"getAddrSpace",
"(",
"k",
".",
"AddressSpace",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"aSpace",
".",
"Lock",
"(",
")",
"\n",
"p",
",",
"ok",
":=",
"aSpace",
".",
"subnets",
"[",
"k",
"]",
"\n",
"if",
"!",
"ok",
"{",
"aSpace",
".",
"Unlock",
"(",
")",
"\n",
"return",
"nil",
",",
"nil",
",",
"types",
".",
"NotFoundErrorf",
"(",
"\"",
"\"",
",",
"poolID",
")",
"\n",
"}",
"\n\n",
"if",
"prefAddress",
"!=",
"nil",
"&&",
"!",
"p",
".",
"Pool",
".",
"Contains",
"(",
"prefAddress",
")",
"{",
"aSpace",
".",
"Unlock",
"(",
")",
"\n",
"return",
"nil",
",",
"nil",
",",
"ipamapi",
".",
"ErrIPOutOfRange",
"\n",
"}",
"\n\n",
"c",
":=",
"p",
"\n",
"for",
"c",
".",
"Range",
"!=",
"nil",
"{",
"k",
"=",
"c",
".",
"ParentKey",
"\n",
"c",
"=",
"aSpace",
".",
"subnets",
"[",
"k",
"]",
"\n",
"}",
"\n",
"aSpace",
".",
"Unlock",
"(",
")",
"\n\n",
"bm",
",",
"err",
":=",
"a",
".",
"retrieveBitmask",
"(",
"k",
",",
"c",
".",
"Pool",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"types",
".",
"InternalErrorf",
"(",
"\"",
"\"",
",",
"k",
".",
"String",
"(",
")",
",",
"prefAddress",
",",
"poolID",
",",
"err",
")",
"\n",
"}",
"\n",
"// In order to request for a serial ip address allocation, callers can pass in the option to request",
"// IP allocation serially or first available IP in the subnet",
"var",
"serial",
"bool",
"\n",
"if",
"opts",
"!=",
"nil",
"{",
"if",
"val",
",",
"ok",
":=",
"opts",
"[",
"ipamapi",
".",
"AllocSerialPrefix",
"]",
";",
"ok",
"{",
"serial",
"=",
"(",
"val",
"==",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}",
"\n",
"ip",
",",
"err",
":=",
"a",
".",
"getAddress",
"(",
"p",
".",
"Pool",
",",
"bm",
",",
"prefAddress",
",",
"p",
".",
"Range",
",",
"serial",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"&",
"net",
".",
"IPNet",
"{",
"IP",
":",
"ip",
",",
"Mask",
":",
"p",
".",
"Pool",
".",
"Mask",
"}",
",",
"nil",
",",
"nil",
"\n",
"}"
] | // RequestAddress returns an address from the specified pool ID | [
"RequestAddress",
"returns",
"an",
"address",
"from",
"the",
"specified",
"pool",
"ID"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipam/allocator.go#L451-L505 | train |
docker/libnetwork | ipam/allocator.go | ReleaseAddress | func (a *Allocator) ReleaseAddress(poolID string, address net.IP) error {
logrus.Debugf("ReleaseAddress(%s, %v)", poolID, address)
k := SubnetKey{}
if err := k.FromString(poolID); err != nil {
return types.BadRequestErrorf("invalid pool id: %s", poolID)
}
if err := a.refresh(k.AddressSpace); err != nil {
return err
}
aSpace, err := a.getAddrSpace(k.AddressSpace)
if err != nil {
return err
}
aSpace.Lock()
p, ok := aSpace.subnets[k]
if !ok {
aSpace.Unlock()
return types.NotFoundErrorf("cannot find address pool for poolID:%s", poolID)
}
if address == nil {
aSpace.Unlock()
return types.BadRequestErrorf("invalid address: nil")
}
if !p.Pool.Contains(address) {
aSpace.Unlock()
return ipamapi.ErrIPOutOfRange
}
c := p
for c.Range != nil {
k = c.ParentKey
c = aSpace.subnets[k]
}
aSpace.Unlock()
mask := p.Pool.Mask
h, err := types.GetHostPartIP(address, mask)
if err != nil {
return types.InternalErrorf("failed to release address %s: %v", address.String(), err)
}
bm, err := a.retrieveBitmask(k, c.Pool)
if err != nil {
return types.InternalErrorf("could not find bitmask in datastore for %s on address %v release from pool %s: %v",
k.String(), address, poolID, err)
}
defer logrus.Debugf("Released address PoolID:%s, Address:%v Sequence:%s", poolID, address, bm.String())
return bm.Unset(ipToUint64(h))
} | go | func (a *Allocator) ReleaseAddress(poolID string, address net.IP) error {
logrus.Debugf("ReleaseAddress(%s, %v)", poolID, address)
k := SubnetKey{}
if err := k.FromString(poolID); err != nil {
return types.BadRequestErrorf("invalid pool id: %s", poolID)
}
if err := a.refresh(k.AddressSpace); err != nil {
return err
}
aSpace, err := a.getAddrSpace(k.AddressSpace)
if err != nil {
return err
}
aSpace.Lock()
p, ok := aSpace.subnets[k]
if !ok {
aSpace.Unlock()
return types.NotFoundErrorf("cannot find address pool for poolID:%s", poolID)
}
if address == nil {
aSpace.Unlock()
return types.BadRequestErrorf("invalid address: nil")
}
if !p.Pool.Contains(address) {
aSpace.Unlock()
return ipamapi.ErrIPOutOfRange
}
c := p
for c.Range != nil {
k = c.ParentKey
c = aSpace.subnets[k]
}
aSpace.Unlock()
mask := p.Pool.Mask
h, err := types.GetHostPartIP(address, mask)
if err != nil {
return types.InternalErrorf("failed to release address %s: %v", address.String(), err)
}
bm, err := a.retrieveBitmask(k, c.Pool)
if err != nil {
return types.InternalErrorf("could not find bitmask in datastore for %s on address %v release from pool %s: %v",
k.String(), address, poolID, err)
}
defer logrus.Debugf("Released address PoolID:%s, Address:%v Sequence:%s", poolID, address, bm.String())
return bm.Unset(ipToUint64(h))
} | [
"func",
"(",
"a",
"*",
"Allocator",
")",
"ReleaseAddress",
"(",
"poolID",
"string",
",",
"address",
"net",
".",
"IP",
")",
"error",
"{",
"logrus",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"poolID",
",",
"address",
")",
"\n",
"k",
":=",
"SubnetKey",
"{",
"}",
"\n",
"if",
"err",
":=",
"k",
".",
"FromString",
"(",
"poolID",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"types",
".",
"BadRequestErrorf",
"(",
"\"",
"\"",
",",
"poolID",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"a",
".",
"refresh",
"(",
"k",
".",
"AddressSpace",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"aSpace",
",",
"err",
":=",
"a",
".",
"getAddrSpace",
"(",
"k",
".",
"AddressSpace",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"aSpace",
".",
"Lock",
"(",
")",
"\n",
"p",
",",
"ok",
":=",
"aSpace",
".",
"subnets",
"[",
"k",
"]",
"\n",
"if",
"!",
"ok",
"{",
"aSpace",
".",
"Unlock",
"(",
")",
"\n",
"return",
"types",
".",
"NotFoundErrorf",
"(",
"\"",
"\"",
",",
"poolID",
")",
"\n",
"}",
"\n\n",
"if",
"address",
"==",
"nil",
"{",
"aSpace",
".",
"Unlock",
"(",
")",
"\n",
"return",
"types",
".",
"BadRequestErrorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"if",
"!",
"p",
".",
"Pool",
".",
"Contains",
"(",
"address",
")",
"{",
"aSpace",
".",
"Unlock",
"(",
")",
"\n",
"return",
"ipamapi",
".",
"ErrIPOutOfRange",
"\n",
"}",
"\n\n",
"c",
":=",
"p",
"\n",
"for",
"c",
".",
"Range",
"!=",
"nil",
"{",
"k",
"=",
"c",
".",
"ParentKey",
"\n",
"c",
"=",
"aSpace",
".",
"subnets",
"[",
"k",
"]",
"\n",
"}",
"\n",
"aSpace",
".",
"Unlock",
"(",
")",
"\n\n",
"mask",
":=",
"p",
".",
"Pool",
".",
"Mask",
"\n\n",
"h",
",",
"err",
":=",
"types",
".",
"GetHostPartIP",
"(",
"address",
",",
"mask",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"types",
".",
"InternalErrorf",
"(",
"\"",
"\"",
",",
"address",
".",
"String",
"(",
")",
",",
"err",
")",
"\n",
"}",
"\n\n",
"bm",
",",
"err",
":=",
"a",
".",
"retrieveBitmask",
"(",
"k",
",",
"c",
".",
"Pool",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"types",
".",
"InternalErrorf",
"(",
"\"",
"\"",
",",
"k",
".",
"String",
"(",
")",
",",
"address",
",",
"poolID",
",",
"err",
")",
"\n",
"}",
"\n",
"defer",
"logrus",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"poolID",
",",
"address",
",",
"bm",
".",
"String",
"(",
")",
")",
"\n\n",
"return",
"bm",
".",
"Unset",
"(",
"ipToUint64",
"(",
"h",
")",
")",
"\n",
"}"
] | // ReleaseAddress releases the address from the specified pool ID | [
"ReleaseAddress",
"releases",
"the",
"address",
"from",
"the",
"specified",
"pool",
"ID"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipam/allocator.go#L508-L563 | train |
docker/libnetwork | ipam/allocator.go | DumpDatabase | func (a *Allocator) DumpDatabase() string {
a.Lock()
aspaces := make(map[string]*addrSpace, len(a.addrSpaces))
orderedAS := make([]string, 0, len(a.addrSpaces))
for as, aSpace := range a.addrSpaces {
orderedAS = append(orderedAS, as)
aspaces[as] = aSpace
}
a.Unlock()
sort.Strings(orderedAS)
var s string
for _, as := range orderedAS {
aSpace := aspaces[as]
s = fmt.Sprintf("\n\n%s Config", as)
aSpace.Lock()
for k, config := range aSpace.subnets {
s += fmt.Sprintf("\n%v: %v", k, config)
if config.Range == nil {
a.retrieveBitmask(k, config.Pool)
}
}
aSpace.Unlock()
}
s = fmt.Sprintf("%s\n\nBitmasks", s)
for k, bm := range a.addresses {
s += fmt.Sprintf("\n%s: %s", k, bm)
}
return s
} | go | func (a *Allocator) DumpDatabase() string {
a.Lock()
aspaces := make(map[string]*addrSpace, len(a.addrSpaces))
orderedAS := make([]string, 0, len(a.addrSpaces))
for as, aSpace := range a.addrSpaces {
orderedAS = append(orderedAS, as)
aspaces[as] = aSpace
}
a.Unlock()
sort.Strings(orderedAS)
var s string
for _, as := range orderedAS {
aSpace := aspaces[as]
s = fmt.Sprintf("\n\n%s Config", as)
aSpace.Lock()
for k, config := range aSpace.subnets {
s += fmt.Sprintf("\n%v: %v", k, config)
if config.Range == nil {
a.retrieveBitmask(k, config.Pool)
}
}
aSpace.Unlock()
}
s = fmt.Sprintf("%s\n\nBitmasks", s)
for k, bm := range a.addresses {
s += fmt.Sprintf("\n%s: %s", k, bm)
}
return s
} | [
"func",
"(",
"a",
"*",
"Allocator",
")",
"DumpDatabase",
"(",
")",
"string",
"{",
"a",
".",
"Lock",
"(",
")",
"\n",
"aspaces",
":=",
"make",
"(",
"map",
"[",
"string",
"]",
"*",
"addrSpace",
",",
"len",
"(",
"a",
".",
"addrSpaces",
")",
")",
"\n",
"orderedAS",
":=",
"make",
"(",
"[",
"]",
"string",
",",
"0",
",",
"len",
"(",
"a",
".",
"addrSpaces",
")",
")",
"\n",
"for",
"as",
",",
"aSpace",
":=",
"range",
"a",
".",
"addrSpaces",
"{",
"orderedAS",
"=",
"append",
"(",
"orderedAS",
",",
"as",
")",
"\n",
"aspaces",
"[",
"as",
"]",
"=",
"aSpace",
"\n",
"}",
"\n",
"a",
".",
"Unlock",
"(",
")",
"\n\n",
"sort",
".",
"Strings",
"(",
"orderedAS",
")",
"\n\n",
"var",
"s",
"string",
"\n",
"for",
"_",
",",
"as",
":=",
"range",
"orderedAS",
"{",
"aSpace",
":=",
"aspaces",
"[",
"as",
"]",
"\n",
"s",
"=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\\n",
"\\n",
"\"",
",",
"as",
")",
"\n",
"aSpace",
".",
"Lock",
"(",
")",
"\n",
"for",
"k",
",",
"config",
":=",
"range",
"aSpace",
".",
"subnets",
"{",
"s",
"+=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\\n",
"\"",
",",
"k",
",",
"config",
")",
"\n",
"if",
"config",
".",
"Range",
"==",
"nil",
"{",
"a",
".",
"retrieveBitmask",
"(",
"k",
",",
"config",
".",
"Pool",
")",
"\n",
"}",
"\n",
"}",
"\n",
"aSpace",
".",
"Unlock",
"(",
")",
"\n",
"}",
"\n\n",
"s",
"=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\\n",
"\\n",
"\"",
",",
"s",
")",
"\n",
"for",
"k",
",",
"bm",
":=",
"range",
"a",
".",
"addresses",
"{",
"s",
"+=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\\n",
"\"",
",",
"k",
",",
"bm",
")",
"\n",
"}",
"\n\n",
"return",
"s",
"\n",
"}"
] | // DumpDatabase dumps the internal info | [
"DumpDatabase",
"dumps",
"the",
"internal",
"info"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipam/allocator.go#L605-L637 | train |
docker/libnetwork | service_linux.go | populateLoadBalancers | func (sb *sandbox) populateLoadBalancers(ep *endpoint) {
// This is an interface less endpoint. Nothing to do.
if ep.Iface() == nil {
return
}
n := ep.getNetwork()
eIP := ep.Iface().Address()
if n.ingress {
if err := addRedirectRules(sb.Key(), eIP, ep.ingressPorts); err != nil {
logrus.Errorf("Failed to add redirect rules for ep %s (%.7s): %v", ep.Name(), ep.ID(), err)
}
}
} | go | func (sb *sandbox) populateLoadBalancers(ep *endpoint) {
// This is an interface less endpoint. Nothing to do.
if ep.Iface() == nil {
return
}
n := ep.getNetwork()
eIP := ep.Iface().Address()
if n.ingress {
if err := addRedirectRules(sb.Key(), eIP, ep.ingressPorts); err != nil {
logrus.Errorf("Failed to add redirect rules for ep %s (%.7s): %v", ep.Name(), ep.ID(), err)
}
}
} | [
"func",
"(",
"sb",
"*",
"sandbox",
")",
"populateLoadBalancers",
"(",
"ep",
"*",
"endpoint",
")",
"{",
"// This is an interface less endpoint. Nothing to do.",
"if",
"ep",
".",
"Iface",
"(",
")",
"==",
"nil",
"{",
"return",
"\n",
"}",
"\n\n",
"n",
":=",
"ep",
".",
"getNetwork",
"(",
")",
"\n",
"eIP",
":=",
"ep",
".",
"Iface",
"(",
")",
".",
"Address",
"(",
")",
"\n\n",
"if",
"n",
".",
"ingress",
"{",
"if",
"err",
":=",
"addRedirectRules",
"(",
"sb",
".",
"Key",
"(",
")",
",",
"eIP",
",",
"ep",
".",
"ingressPorts",
")",
";",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"ep",
".",
"Name",
"(",
")",
",",
"ep",
".",
"ID",
"(",
")",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // Populate all loadbalancers on the network that the passed endpoint
// belongs to, into this sandbox. | [
"Populate",
"all",
"loadbalancers",
"on",
"the",
"network",
"that",
"the",
"passed",
"endpoint",
"belongs",
"to",
"into",
"this",
"sandbox",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/service_linux.go#L35-L49 | train |
docker/libnetwork | service_linux.go | invokeFWMarker | func invokeFWMarker(path string, vip net.IP, fwMark uint32, ingressPorts []*PortConfig, eIP *net.IPNet, isDelete bool, lbMode string) error {
var ingressPortsFile string
if len(ingressPorts) != 0 {
var err error
ingressPortsFile, err = writePortsToFile(ingressPorts)
if err != nil {
return err
}
defer os.Remove(ingressPortsFile)
}
addDelOpt := "-A"
if isDelete {
addDelOpt = "-D"
}
cmd := &exec.Cmd{
Path: reexec.Self(),
Args: append([]string{"fwmarker"}, path, vip.String(), fmt.Sprintf("%d", fwMark), addDelOpt, ingressPortsFile, eIP.String(), lbMode),
Stdout: os.Stdout,
Stderr: os.Stderr,
}
if err := cmd.Run(); err != nil {
return fmt.Errorf("reexec failed: %v", err)
}
return nil
} | go | func invokeFWMarker(path string, vip net.IP, fwMark uint32, ingressPorts []*PortConfig, eIP *net.IPNet, isDelete bool, lbMode string) error {
var ingressPortsFile string
if len(ingressPorts) != 0 {
var err error
ingressPortsFile, err = writePortsToFile(ingressPorts)
if err != nil {
return err
}
defer os.Remove(ingressPortsFile)
}
addDelOpt := "-A"
if isDelete {
addDelOpt = "-D"
}
cmd := &exec.Cmd{
Path: reexec.Self(),
Args: append([]string{"fwmarker"}, path, vip.String(), fmt.Sprintf("%d", fwMark), addDelOpt, ingressPortsFile, eIP.String(), lbMode),
Stdout: os.Stdout,
Stderr: os.Stderr,
}
if err := cmd.Run(); err != nil {
return fmt.Errorf("reexec failed: %v", err)
}
return nil
} | [
"func",
"invokeFWMarker",
"(",
"path",
"string",
",",
"vip",
"net",
".",
"IP",
",",
"fwMark",
"uint32",
",",
"ingressPorts",
"[",
"]",
"*",
"PortConfig",
",",
"eIP",
"*",
"net",
".",
"IPNet",
",",
"isDelete",
"bool",
",",
"lbMode",
"string",
")",
"error",
"{",
"var",
"ingressPortsFile",
"string",
"\n\n",
"if",
"len",
"(",
"ingressPorts",
")",
"!=",
"0",
"{",
"var",
"err",
"error",
"\n",
"ingressPortsFile",
",",
"err",
"=",
"writePortsToFile",
"(",
"ingressPorts",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"defer",
"os",
".",
"Remove",
"(",
"ingressPortsFile",
")",
"\n",
"}",
"\n\n",
"addDelOpt",
":=",
"\"",
"\"",
"\n",
"if",
"isDelete",
"{",
"addDelOpt",
"=",
"\"",
"\"",
"\n",
"}",
"\n\n",
"cmd",
":=",
"&",
"exec",
".",
"Cmd",
"{",
"Path",
":",
"reexec",
".",
"Self",
"(",
")",
",",
"Args",
":",
"append",
"(",
"[",
"]",
"string",
"{",
"\"",
"\"",
"}",
",",
"path",
",",
"vip",
".",
"String",
"(",
")",
",",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"fwMark",
")",
",",
"addDelOpt",
",",
"ingressPortsFile",
",",
"eIP",
".",
"String",
"(",
")",
",",
"lbMode",
")",
",",
"Stdout",
":",
"os",
".",
"Stdout",
",",
"Stderr",
":",
"os",
".",
"Stderr",
",",
"}",
"\n\n",
"if",
"err",
":=",
"cmd",
".",
"Run",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Invoke fwmarker reexec routine to mark vip destined packets with
// the passed firewall mark. | [
"Invoke",
"fwmarker",
"reexec",
"routine",
"to",
"mark",
"vip",
"destined",
"packets",
"with",
"the",
"passed",
"firewall",
"mark",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/service_linux.go#L575-L605 | train |
docker/libnetwork | drivers/windows/windows.go | IsBuiltinLocalDriver | func IsBuiltinLocalDriver(networkType string) bool {
if "l2bridge" == networkType || "l2tunnel" == networkType || "nat" == networkType || "ics" == networkType || "transparent" == networkType {
return true
}
return false
} | go | func IsBuiltinLocalDriver(networkType string) bool {
if "l2bridge" == networkType || "l2tunnel" == networkType || "nat" == networkType || "ics" == networkType || "transparent" == networkType {
return true
}
return false
} | [
"func",
"IsBuiltinLocalDriver",
"(",
"networkType",
"string",
")",
"bool",
"{",
"if",
"\"",
"\"",
"==",
"networkType",
"||",
"\"",
"\"",
"==",
"networkType",
"||",
"\"",
"\"",
"==",
"networkType",
"||",
"\"",
"\"",
"==",
"networkType",
"||",
"\"",
"\"",
"==",
"networkType",
"{",
"return",
"true",
"\n",
"}",
"\n\n",
"return",
"false",
"\n",
"}"
] | // IsBuiltinLocalDriver validates if network-type is a builtin local-scoped driver | [
"IsBuiltinLocalDriver",
"validates",
"if",
"network",
"-",
"type",
"is",
"a",
"builtin",
"local",
"-",
"scoped",
"driver"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/windows/windows.go#L113-L119 | train |
docker/libnetwork | drivers/windows/windows.go | newDriver | func newDriver(networkType string) *driver {
return &driver{name: networkType, networks: map[string]*hnsNetwork{}}
} | go | func newDriver(networkType string) *driver {
return &driver{name: networkType, networks: map[string]*hnsNetwork{}}
} | [
"func",
"newDriver",
"(",
"networkType",
"string",
")",
"*",
"driver",
"{",
"return",
"&",
"driver",
"{",
"name",
":",
"networkType",
",",
"networks",
":",
"map",
"[",
"string",
"]",
"*",
"hnsNetwork",
"{",
"}",
"}",
"\n",
"}"
] | // New constructs a new bridge driver | [
"New",
"constructs",
"a",
"new",
"bridge",
"driver"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/windows/windows.go#L122-L124 | train |
docker/libnetwork | drivers/windows/windows.go | GetInit | func GetInit(networkType string) func(dc driverapi.DriverCallback, config map[string]interface{}) error {
return func(dc driverapi.DriverCallback, config map[string]interface{}) error {
if !IsBuiltinLocalDriver(networkType) {
return types.BadRequestErrorf("Network type not supported: %s", networkType)
}
d := newDriver(networkType)
err := d.initStore(config)
if err != nil {
return err
}
return dc.RegisterDriver(networkType, d, driverapi.Capability{
DataScope: datastore.LocalScope,
ConnectivityScope: datastore.LocalScope,
})
}
} | go | func GetInit(networkType string) func(dc driverapi.DriverCallback, config map[string]interface{}) error {
return func(dc driverapi.DriverCallback, config map[string]interface{}) error {
if !IsBuiltinLocalDriver(networkType) {
return types.BadRequestErrorf("Network type not supported: %s", networkType)
}
d := newDriver(networkType)
err := d.initStore(config)
if err != nil {
return err
}
return dc.RegisterDriver(networkType, d, driverapi.Capability{
DataScope: datastore.LocalScope,
ConnectivityScope: datastore.LocalScope,
})
}
} | [
"func",
"GetInit",
"(",
"networkType",
"string",
")",
"func",
"(",
"dc",
"driverapi",
".",
"DriverCallback",
",",
"config",
"map",
"[",
"string",
"]",
"interface",
"{",
"}",
")",
"error",
"{",
"return",
"func",
"(",
"dc",
"driverapi",
".",
"DriverCallback",
",",
"config",
"map",
"[",
"string",
"]",
"interface",
"{",
"}",
")",
"error",
"{",
"if",
"!",
"IsBuiltinLocalDriver",
"(",
"networkType",
")",
"{",
"return",
"types",
".",
"BadRequestErrorf",
"(",
"\"",
"\"",
",",
"networkType",
")",
"\n",
"}",
"\n\n",
"d",
":=",
"newDriver",
"(",
"networkType",
")",
"\n\n",
"err",
":=",
"d",
".",
"initStore",
"(",
"config",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"return",
"dc",
".",
"RegisterDriver",
"(",
"networkType",
",",
"d",
",",
"driverapi",
".",
"Capability",
"{",
"DataScope",
":",
"datastore",
".",
"LocalScope",
",",
"ConnectivityScope",
":",
"datastore",
".",
"LocalScope",
",",
"}",
")",
"\n",
"}",
"\n",
"}"
] | // GetInit returns an initializer for the given network type | [
"GetInit",
"returns",
"an",
"initializer",
"for",
"the",
"given",
"network",
"type"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/windows/windows.go#L127-L145 | train |
docker/libnetwork | drivers/windows/windows.go | ConvertPortBindings | func ConvertPortBindings(portBindings []types.PortBinding) ([]json.RawMessage, error) {
var pbs []json.RawMessage
// Enumerate through the port bindings specified by the user and convert
// them into the internal structure matching the JSON blob that can be
// understood by the HCS.
for _, elem := range portBindings {
proto := strings.ToUpper(elem.Proto.String())
if proto != "TCP" && proto != "UDP" {
return nil, fmt.Errorf("invalid protocol %s", elem.Proto.String())
}
if elem.HostPort != elem.HostPortEnd {
return nil, fmt.Errorf("Windows does not support more than one host port in NAT settings")
}
if len(elem.HostIP) != 0 {
return nil, fmt.Errorf("Windows does not support host IP addresses in NAT settings")
}
encodedPolicy, err := json.Marshal(hcsshim.NatPolicy{
Type: "NAT",
ExternalPort: elem.HostPort,
InternalPort: elem.Port,
Protocol: elem.Proto.String(),
})
if err != nil {
return nil, err
}
pbs = append(pbs, encodedPolicy)
}
return pbs, nil
} | go | func ConvertPortBindings(portBindings []types.PortBinding) ([]json.RawMessage, error) {
var pbs []json.RawMessage
// Enumerate through the port bindings specified by the user and convert
// them into the internal structure matching the JSON blob that can be
// understood by the HCS.
for _, elem := range portBindings {
proto := strings.ToUpper(elem.Proto.String())
if proto != "TCP" && proto != "UDP" {
return nil, fmt.Errorf("invalid protocol %s", elem.Proto.String())
}
if elem.HostPort != elem.HostPortEnd {
return nil, fmt.Errorf("Windows does not support more than one host port in NAT settings")
}
if len(elem.HostIP) != 0 {
return nil, fmt.Errorf("Windows does not support host IP addresses in NAT settings")
}
encodedPolicy, err := json.Marshal(hcsshim.NatPolicy{
Type: "NAT",
ExternalPort: elem.HostPort,
InternalPort: elem.Port,
Protocol: elem.Proto.String(),
})
if err != nil {
return nil, err
}
pbs = append(pbs, encodedPolicy)
}
return pbs, nil
} | [
"func",
"ConvertPortBindings",
"(",
"portBindings",
"[",
"]",
"types",
".",
"PortBinding",
")",
"(",
"[",
"]",
"json",
".",
"RawMessage",
",",
"error",
")",
"{",
"var",
"pbs",
"[",
"]",
"json",
".",
"RawMessage",
"\n\n",
"// Enumerate through the port bindings specified by the user and convert",
"// them into the internal structure matching the JSON blob that can be",
"// understood by the HCS.",
"for",
"_",
",",
"elem",
":=",
"range",
"portBindings",
"{",
"proto",
":=",
"strings",
".",
"ToUpper",
"(",
"elem",
".",
"Proto",
".",
"String",
"(",
")",
")",
"\n",
"if",
"proto",
"!=",
"\"",
"\"",
"&&",
"proto",
"!=",
"\"",
"\"",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"elem",
".",
"Proto",
".",
"String",
"(",
")",
")",
"\n",
"}",
"\n\n",
"if",
"elem",
".",
"HostPort",
"!=",
"elem",
".",
"HostPortEnd",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"elem",
".",
"HostIP",
")",
"!=",
"0",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"encodedPolicy",
",",
"err",
":=",
"json",
".",
"Marshal",
"(",
"hcsshim",
".",
"NatPolicy",
"{",
"Type",
":",
"\"",
"\"",
",",
"ExternalPort",
":",
"elem",
".",
"HostPort",
",",
"InternalPort",
":",
"elem",
".",
"Port",
",",
"Protocol",
":",
"elem",
".",
"Proto",
".",
"String",
"(",
")",
",",
"}",
")",
"\n\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"pbs",
"=",
"append",
"(",
"pbs",
",",
"encodedPolicy",
")",
"\n",
"}",
"\n",
"return",
"pbs",
",",
"nil",
"\n",
"}"
] | // ConvertPortBindings converts PortBindings to JSON for HNS request | [
"ConvertPortBindings",
"converts",
"PortBindings",
"to",
"JSON",
"for",
"HNS",
"request"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/windows/windows.go#L449-L482 | train |
docker/libnetwork | drivers/windows/windows.go | ParsePortBindingPolicies | func ParsePortBindingPolicies(policies []json.RawMessage) ([]types.PortBinding, error) {
var bindings []types.PortBinding
hcsPolicy := &hcsshim.NatPolicy{}
for _, elem := range policies {
if err := json.Unmarshal([]byte(elem), &hcsPolicy); err != nil || hcsPolicy.Type != "NAT" {
continue
}
binding := types.PortBinding{
HostPort: hcsPolicy.ExternalPort,
HostPortEnd: hcsPolicy.ExternalPort,
Port: hcsPolicy.InternalPort,
Proto: types.ParseProtocol(hcsPolicy.Protocol),
HostIP: net.IPv4(0, 0, 0, 0),
}
bindings = append(bindings, binding)
}
return bindings, nil
} | go | func ParsePortBindingPolicies(policies []json.RawMessage) ([]types.PortBinding, error) {
var bindings []types.PortBinding
hcsPolicy := &hcsshim.NatPolicy{}
for _, elem := range policies {
if err := json.Unmarshal([]byte(elem), &hcsPolicy); err != nil || hcsPolicy.Type != "NAT" {
continue
}
binding := types.PortBinding{
HostPort: hcsPolicy.ExternalPort,
HostPortEnd: hcsPolicy.ExternalPort,
Port: hcsPolicy.InternalPort,
Proto: types.ParseProtocol(hcsPolicy.Protocol),
HostIP: net.IPv4(0, 0, 0, 0),
}
bindings = append(bindings, binding)
}
return bindings, nil
} | [
"func",
"ParsePortBindingPolicies",
"(",
"policies",
"[",
"]",
"json",
".",
"RawMessage",
")",
"(",
"[",
"]",
"types",
".",
"PortBinding",
",",
"error",
")",
"{",
"var",
"bindings",
"[",
"]",
"types",
".",
"PortBinding",
"\n",
"hcsPolicy",
":=",
"&",
"hcsshim",
".",
"NatPolicy",
"{",
"}",
"\n\n",
"for",
"_",
",",
"elem",
":=",
"range",
"policies",
"{",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"[",
"]",
"byte",
"(",
"elem",
")",
",",
"&",
"hcsPolicy",
")",
";",
"err",
"!=",
"nil",
"||",
"hcsPolicy",
".",
"Type",
"!=",
"\"",
"\"",
"{",
"continue",
"\n",
"}",
"\n\n",
"binding",
":=",
"types",
".",
"PortBinding",
"{",
"HostPort",
":",
"hcsPolicy",
".",
"ExternalPort",
",",
"HostPortEnd",
":",
"hcsPolicy",
".",
"ExternalPort",
",",
"Port",
":",
"hcsPolicy",
".",
"InternalPort",
",",
"Proto",
":",
"types",
".",
"ParseProtocol",
"(",
"hcsPolicy",
".",
"Protocol",
")",
",",
"HostIP",
":",
"net",
".",
"IPv4",
"(",
"0",
",",
"0",
",",
"0",
",",
"0",
")",
",",
"}",
"\n\n",
"bindings",
"=",
"append",
"(",
"bindings",
",",
"binding",
")",
"\n",
"}",
"\n\n",
"return",
"bindings",
",",
"nil",
"\n",
"}"
] | // ParsePortBindingPolicies parses HNS endpoint response message to PortBindings | [
"ParsePortBindingPolicies",
"parses",
"HNS",
"endpoint",
"response",
"message",
"to",
"PortBindings"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/windows/windows.go#L485-L507 | train |
docker/libnetwork | drivers/windows/windows.go | ParseEndpointConnectivity | func ParseEndpointConnectivity(epOptions map[string]interface{}) (*EndpointConnectivity, error) {
if epOptions == nil {
return nil, nil
}
ec := &EndpointConnectivity{}
if opt, ok := epOptions[netlabel.PortMap]; ok {
if bs, ok := opt.([]types.PortBinding); ok {
ec.PortBindings = bs
} else {
return nil, fmt.Errorf("Invalid endpoint configuration")
}
}
if opt, ok := epOptions[netlabel.ExposedPorts]; ok {
if ports, ok := opt.([]types.TransportPort); ok {
ec.ExposedPorts = ports
} else {
return nil, fmt.Errorf("Invalid endpoint configuration")
}
}
return ec, nil
} | go | func ParseEndpointConnectivity(epOptions map[string]interface{}) (*EndpointConnectivity, error) {
if epOptions == nil {
return nil, nil
}
ec := &EndpointConnectivity{}
if opt, ok := epOptions[netlabel.PortMap]; ok {
if bs, ok := opt.([]types.PortBinding); ok {
ec.PortBindings = bs
} else {
return nil, fmt.Errorf("Invalid endpoint configuration")
}
}
if opt, ok := epOptions[netlabel.ExposedPorts]; ok {
if ports, ok := opt.([]types.TransportPort); ok {
ec.ExposedPorts = ports
} else {
return nil, fmt.Errorf("Invalid endpoint configuration")
}
}
return ec, nil
} | [
"func",
"ParseEndpointConnectivity",
"(",
"epOptions",
"map",
"[",
"string",
"]",
"interface",
"{",
"}",
")",
"(",
"*",
"EndpointConnectivity",
",",
"error",
")",
"{",
"if",
"epOptions",
"==",
"nil",
"{",
"return",
"nil",
",",
"nil",
"\n",
"}",
"\n\n",
"ec",
":=",
"&",
"EndpointConnectivity",
"{",
"}",
"\n\n",
"if",
"opt",
",",
"ok",
":=",
"epOptions",
"[",
"netlabel",
".",
"PortMap",
"]",
";",
"ok",
"{",
"if",
"bs",
",",
"ok",
":=",
"opt",
".",
"(",
"[",
"]",
"types",
".",
"PortBinding",
")",
";",
"ok",
"{",
"ec",
".",
"PortBindings",
"=",
"bs",
"\n",
"}",
"else",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"opt",
",",
"ok",
":=",
"epOptions",
"[",
"netlabel",
".",
"ExposedPorts",
"]",
";",
"ok",
"{",
"if",
"ports",
",",
"ok",
":=",
"opt",
".",
"(",
"[",
"]",
"types",
".",
"TransportPort",
")",
";",
"ok",
"{",
"ec",
".",
"ExposedPorts",
"=",
"ports",
"\n",
"}",
"else",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"ec",
",",
"nil",
"\n",
"}"
] | // ParseEndpointConnectivity parses options passed to CreateEndpoint, specifically port bindings, and store in a endpointConnectivity object. | [
"ParseEndpointConnectivity",
"parses",
"options",
"passed",
"to",
"CreateEndpoint",
"specifically",
"port",
"bindings",
"and",
"store",
"in",
"a",
"endpointConnectivity",
"object",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/windows/windows.go#L560-L583 | train |
docker/libnetwork | service_common.go | cleanupServiceDiscovery | func (c *controller) cleanupServiceDiscovery(cleanupNID string) {
c.Lock()
defer c.Unlock()
if cleanupNID == "" {
logrus.Debugf("cleanupServiceDiscovery for all networks")
c.svcRecords = make(map[string]svcInfo)
return
}
logrus.Debugf("cleanupServiceDiscovery for network:%s", cleanupNID)
delete(c.svcRecords, cleanupNID)
} | go | func (c *controller) cleanupServiceDiscovery(cleanupNID string) {
c.Lock()
defer c.Unlock()
if cleanupNID == "" {
logrus.Debugf("cleanupServiceDiscovery for all networks")
c.svcRecords = make(map[string]svcInfo)
return
}
logrus.Debugf("cleanupServiceDiscovery for network:%s", cleanupNID)
delete(c.svcRecords, cleanupNID)
} | [
"func",
"(",
"c",
"*",
"controller",
")",
"cleanupServiceDiscovery",
"(",
"cleanupNID",
"string",
")",
"{",
"c",
".",
"Lock",
"(",
")",
"\n",
"defer",
"c",
".",
"Unlock",
"(",
")",
"\n",
"if",
"cleanupNID",
"==",
"\"",
"\"",
"{",
"logrus",
".",
"Debugf",
"(",
"\"",
"\"",
")",
"\n",
"c",
".",
"svcRecords",
"=",
"make",
"(",
"map",
"[",
"string",
"]",
"svcInfo",
")",
"\n",
"return",
"\n",
"}",
"\n",
"logrus",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"cleanupNID",
")",
"\n",
"delete",
"(",
"c",
".",
"svcRecords",
",",
"cleanupNID",
")",
"\n",
"}"
] | // cleanupServiceDiscovery when the network is being deleted, erase all the associated service discovery records | [
"cleanupServiceDiscovery",
"when",
"the",
"network",
"is",
"being",
"deleted",
"erase",
"all",
"the",
"associated",
"service",
"discovery",
"records"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/service_common.go#L167-L177 | train |
docker/libnetwork | drivers/bridge/setup_bridgenetfiltering.go | getKernelBoolParam | func getKernelBoolParam(path string) (bool, error) {
enabled := false
line, err := ioutil.ReadFile(path)
if err != nil {
return false, err
}
if len(line) > 0 {
enabled = line[0] == '1'
}
return enabled, err
} | go | func getKernelBoolParam(path string) (bool, error) {
enabled := false
line, err := ioutil.ReadFile(path)
if err != nil {
return false, err
}
if len(line) > 0 {
enabled = line[0] == '1'
}
return enabled, err
} | [
"func",
"getKernelBoolParam",
"(",
"path",
"string",
")",
"(",
"bool",
",",
"error",
")",
"{",
"enabled",
":=",
"false",
"\n",
"line",
",",
"err",
":=",
"ioutil",
".",
"ReadFile",
"(",
"path",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"err",
"\n",
"}",
"\n",
"if",
"len",
"(",
"line",
")",
">",
"0",
"{",
"enabled",
"=",
"line",
"[",
"0",
"]",
"==",
"'1'",
"\n",
"}",
"\n",
"return",
"enabled",
",",
"err",
"\n",
"}"
] | //Gets the value of the kernel parameters located at the given path | [
"Gets",
"the",
"value",
"of",
"the",
"kernel",
"parameters",
"located",
"at",
"the",
"given",
"path"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/bridge/setup_bridgenetfiltering.go#L123-L133 | train |
docker/libnetwork | drivers/bridge/setup_bridgenetfiltering.go | setKernelBoolParam | func setKernelBoolParam(path string, on bool) error {
value := byte('0')
if on {
value = byte('1')
}
return ioutil.WriteFile(path, []byte{value, '\n'}, 0644)
} | go | func setKernelBoolParam(path string, on bool) error {
value := byte('0')
if on {
value = byte('1')
}
return ioutil.WriteFile(path, []byte{value, '\n'}, 0644)
} | [
"func",
"setKernelBoolParam",
"(",
"path",
"string",
",",
"on",
"bool",
")",
"error",
"{",
"value",
":=",
"byte",
"(",
"'0'",
")",
"\n",
"if",
"on",
"{",
"value",
"=",
"byte",
"(",
"'1'",
")",
"\n",
"}",
"\n",
"return",
"ioutil",
".",
"WriteFile",
"(",
"path",
",",
"[",
"]",
"byte",
"{",
"value",
",",
"'\\n'",
"}",
",",
"0644",
")",
"\n",
"}"
] | //Sets the value of the kernel parameter located at the given path | [
"Sets",
"the",
"value",
"of",
"the",
"kernel",
"parameter",
"located",
"at",
"the",
"given",
"path"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/bridge/setup_bridgenetfiltering.go#L136-L142 | train |
docker/libnetwork | drivers/bridge/setup_bridgenetfiltering.go | isPacketForwardingEnabled | func isPacketForwardingEnabled(ipVer ipVersion, iface string) (bool, error) {
switch ipVer {
case ipv4, ipv6:
return getKernelBoolParam(getForwardingKernelParam(ipVer, iface))
case ipvboth:
enabled, err := getKernelBoolParam(getForwardingKernelParam(ipv4, ""))
if err != nil || !enabled {
return enabled, err
}
return getKernelBoolParam(getForwardingKernelParam(ipv6, iface))
default:
return true, nil
}
} | go | func isPacketForwardingEnabled(ipVer ipVersion, iface string) (bool, error) {
switch ipVer {
case ipv4, ipv6:
return getKernelBoolParam(getForwardingKernelParam(ipVer, iface))
case ipvboth:
enabled, err := getKernelBoolParam(getForwardingKernelParam(ipv4, ""))
if err != nil || !enabled {
return enabled, err
}
return getKernelBoolParam(getForwardingKernelParam(ipv6, iface))
default:
return true, nil
}
} | [
"func",
"isPacketForwardingEnabled",
"(",
"ipVer",
"ipVersion",
",",
"iface",
"string",
")",
"(",
"bool",
",",
"error",
")",
"{",
"switch",
"ipVer",
"{",
"case",
"ipv4",
",",
"ipv6",
":",
"return",
"getKernelBoolParam",
"(",
"getForwardingKernelParam",
"(",
"ipVer",
",",
"iface",
")",
")",
"\n",
"case",
"ipvboth",
":",
"enabled",
",",
"err",
":=",
"getKernelBoolParam",
"(",
"getForwardingKernelParam",
"(",
"ipv4",
",",
"\"",
"\"",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"||",
"!",
"enabled",
"{",
"return",
"enabled",
",",
"err",
"\n",
"}",
"\n",
"return",
"getKernelBoolParam",
"(",
"getForwardingKernelParam",
"(",
"ipv6",
",",
"iface",
")",
")",
"\n",
"default",
":",
"return",
"true",
",",
"nil",
"\n",
"}",
"\n",
"}"
] | //Checks to see if packet forwarding is enabled | [
"Checks",
"to",
"see",
"if",
"packet",
"forwarding",
"is",
"enabled"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/drivers/bridge/setup_bridgenetfiltering.go#L145-L158 | train |
docker/libnetwork | endpoint.go | isServiceEnabled | func (ep *endpoint) isServiceEnabled() bool {
ep.Lock()
defer ep.Unlock()
return ep.serviceEnabled
} | go | func (ep *endpoint) isServiceEnabled() bool {
ep.Lock()
defer ep.Unlock()
return ep.serviceEnabled
} | [
"func",
"(",
"ep",
"*",
"endpoint",
")",
"isServiceEnabled",
"(",
")",
"bool",
"{",
"ep",
".",
"Lock",
"(",
")",
"\n",
"defer",
"ep",
".",
"Unlock",
"(",
")",
"\n",
"return",
"ep",
".",
"serviceEnabled",
"\n",
"}"
] | // isServiceEnabled check if service is enabled on the endpoint | [
"isServiceEnabled",
"check",
"if",
"service",
"is",
"enabled",
"on",
"the",
"endpoint"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/endpoint.go#L314-L318 | train |
docker/libnetwork | endpoint.go | enableService | func (ep *endpoint) enableService() {
ep.Lock()
defer ep.Unlock()
ep.serviceEnabled = true
} | go | func (ep *endpoint) enableService() {
ep.Lock()
defer ep.Unlock()
ep.serviceEnabled = true
} | [
"func",
"(",
"ep",
"*",
"endpoint",
")",
"enableService",
"(",
")",
"{",
"ep",
".",
"Lock",
"(",
")",
"\n",
"defer",
"ep",
".",
"Unlock",
"(",
")",
"\n",
"ep",
".",
"serviceEnabled",
"=",
"true",
"\n",
"}"
] | // enableService sets service enabled on the endpoint | [
"enableService",
"sets",
"service",
"enabled",
"on",
"the",
"endpoint"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/endpoint.go#L321-L325 | train |
docker/libnetwork | endpoint.go | disableService | func (ep *endpoint) disableService() {
ep.Lock()
defer ep.Unlock()
ep.serviceEnabled = false
} | go | func (ep *endpoint) disableService() {
ep.Lock()
defer ep.Unlock()
ep.serviceEnabled = false
} | [
"func",
"(",
"ep",
"*",
"endpoint",
")",
"disableService",
"(",
")",
"{",
"ep",
".",
"Lock",
"(",
")",
"\n",
"defer",
"ep",
".",
"Unlock",
"(",
")",
"\n",
"ep",
".",
"serviceEnabled",
"=",
"false",
"\n",
"}"
] | // disableService disables service on the endpoint | [
"disableService",
"disables",
"service",
"on",
"the",
"endpoint"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/endpoint.go#L328-L332 | train |
docker/libnetwork | endpoint.go | EndpointOptionGeneric | func EndpointOptionGeneric(generic map[string]interface{}) EndpointOption {
return func(ep *endpoint) {
for k, v := range generic {
ep.generic[k] = v
}
}
} | go | func EndpointOptionGeneric(generic map[string]interface{}) EndpointOption {
return func(ep *endpoint) {
for k, v := range generic {
ep.generic[k] = v
}
}
} | [
"func",
"EndpointOptionGeneric",
"(",
"generic",
"map",
"[",
"string",
"]",
"interface",
"{",
"}",
")",
"EndpointOption",
"{",
"return",
"func",
"(",
"ep",
"*",
"endpoint",
")",
"{",
"for",
"k",
",",
"v",
":=",
"range",
"generic",
"{",
"ep",
".",
"generic",
"[",
"k",
"]",
"=",
"v",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // EndpointOptionGeneric function returns an option setter for a Generic option defined
// in a Dictionary of Key-Value pair | [
"EndpointOptionGeneric",
"function",
"returns",
"an",
"option",
"setter",
"for",
"a",
"Generic",
"option",
"defined",
"in",
"a",
"Dictionary",
"of",
"Key",
"-",
"Value",
"pair"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/endpoint.go#L928-L934 | train |
docker/libnetwork | endpoint.go | CreateOptionIpam | func CreateOptionIpam(ipV4, ipV6 net.IP, llIPs []net.IP, ipamOptions map[string]string) EndpointOption {
return func(ep *endpoint) {
ep.prefAddress = ipV4
ep.prefAddressV6 = ipV6
if len(llIPs) != 0 {
for _, ip := range llIPs {
nw := &net.IPNet{IP: ip, Mask: linkLocalMask}
if ip.To4() == nil {
nw.Mask = linkLocalMaskIPv6
}
ep.iface.llAddrs = append(ep.iface.llAddrs, nw)
}
}
ep.ipamOptions = ipamOptions
}
} | go | func CreateOptionIpam(ipV4, ipV6 net.IP, llIPs []net.IP, ipamOptions map[string]string) EndpointOption {
return func(ep *endpoint) {
ep.prefAddress = ipV4
ep.prefAddressV6 = ipV6
if len(llIPs) != 0 {
for _, ip := range llIPs {
nw := &net.IPNet{IP: ip, Mask: linkLocalMask}
if ip.To4() == nil {
nw.Mask = linkLocalMaskIPv6
}
ep.iface.llAddrs = append(ep.iface.llAddrs, nw)
}
}
ep.ipamOptions = ipamOptions
}
} | [
"func",
"CreateOptionIpam",
"(",
"ipV4",
",",
"ipV6",
"net",
".",
"IP",
",",
"llIPs",
"[",
"]",
"net",
".",
"IP",
",",
"ipamOptions",
"map",
"[",
"string",
"]",
"string",
")",
"EndpointOption",
"{",
"return",
"func",
"(",
"ep",
"*",
"endpoint",
")",
"{",
"ep",
".",
"prefAddress",
"=",
"ipV4",
"\n",
"ep",
".",
"prefAddressV6",
"=",
"ipV6",
"\n",
"if",
"len",
"(",
"llIPs",
")",
"!=",
"0",
"{",
"for",
"_",
",",
"ip",
":=",
"range",
"llIPs",
"{",
"nw",
":=",
"&",
"net",
".",
"IPNet",
"{",
"IP",
":",
"ip",
",",
"Mask",
":",
"linkLocalMask",
"}",
"\n",
"if",
"ip",
".",
"To4",
"(",
")",
"==",
"nil",
"{",
"nw",
".",
"Mask",
"=",
"linkLocalMaskIPv6",
"\n",
"}",
"\n",
"ep",
".",
"iface",
".",
"llAddrs",
"=",
"append",
"(",
"ep",
".",
"iface",
".",
"llAddrs",
",",
"nw",
")",
"\n",
"}",
"\n",
"}",
"\n",
"ep",
".",
"ipamOptions",
"=",
"ipamOptions",
"\n",
"}",
"\n",
"}"
] | // CreateOptionIpam function returns an option setter for the ipam configuration for this endpoint | [
"CreateOptionIpam",
"function",
"returns",
"an",
"option",
"setter",
"for",
"the",
"ipam",
"configuration",
"for",
"this",
"endpoint"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/endpoint.go#L942-L957 | train |
docker/libnetwork | endpoint.go | CreateOptionDNS | func CreateOptionDNS(dns []string) EndpointOption {
return func(ep *endpoint) {
ep.generic[netlabel.DNSServers] = dns
}
} | go | func CreateOptionDNS(dns []string) EndpointOption {
return func(ep *endpoint) {
ep.generic[netlabel.DNSServers] = dns
}
} | [
"func",
"CreateOptionDNS",
"(",
"dns",
"[",
"]",
"string",
")",
"EndpointOption",
"{",
"return",
"func",
"(",
"ep",
"*",
"endpoint",
")",
"{",
"ep",
".",
"generic",
"[",
"netlabel",
".",
"DNSServers",
"]",
"=",
"dns",
"\n",
"}",
"\n",
"}"
] | // CreateOptionDNS function returns an option setter for dns entry option to
// be passed to container Create method. | [
"CreateOptionDNS",
"function",
"returns",
"an",
"option",
"setter",
"for",
"dns",
"entry",
"option",
"to",
"be",
"passed",
"to",
"container",
"Create",
"method",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/endpoint.go#L985-L989 | train |
docker/libnetwork | endpoint.go | CreateOptionAlias | func CreateOptionAlias(name string, alias string) EndpointOption {
return func(ep *endpoint) {
if ep.aliases == nil {
ep.aliases = make(map[string]string)
}
ep.aliases[alias] = name
}
} | go | func CreateOptionAlias(name string, alias string) EndpointOption {
return func(ep *endpoint) {
if ep.aliases == nil {
ep.aliases = make(map[string]string)
}
ep.aliases[alias] = name
}
} | [
"func",
"CreateOptionAlias",
"(",
"name",
"string",
",",
"alias",
"string",
")",
"EndpointOption",
"{",
"return",
"func",
"(",
"ep",
"*",
"endpoint",
")",
"{",
"if",
"ep",
".",
"aliases",
"==",
"nil",
"{",
"ep",
".",
"aliases",
"=",
"make",
"(",
"map",
"[",
"string",
"]",
"string",
")",
"\n",
"}",
"\n",
"ep",
".",
"aliases",
"[",
"alias",
"]",
"=",
"name",
"\n",
"}",
"\n",
"}"
] | // CreateOptionAlias function returns an option setter for setting endpoint alias | [
"CreateOptionAlias",
"function",
"returns",
"an",
"option",
"setter",
"for",
"setting",
"endpoint",
"alias"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/endpoint.go#L1008-L1015 | train |
docker/libnetwork | endpoint.go | CreateOptionService | func CreateOptionService(name, id string, vip net.IP, ingressPorts []*PortConfig, aliases []string) EndpointOption {
return func(ep *endpoint) {
ep.svcName = name
ep.svcID = id
ep.virtualIP = vip
ep.ingressPorts = ingressPorts
ep.svcAliases = aliases
}
} | go | func CreateOptionService(name, id string, vip net.IP, ingressPorts []*PortConfig, aliases []string) EndpointOption {
return func(ep *endpoint) {
ep.svcName = name
ep.svcID = id
ep.virtualIP = vip
ep.ingressPorts = ingressPorts
ep.svcAliases = aliases
}
} | [
"func",
"CreateOptionService",
"(",
"name",
",",
"id",
"string",
",",
"vip",
"net",
".",
"IP",
",",
"ingressPorts",
"[",
"]",
"*",
"PortConfig",
",",
"aliases",
"[",
"]",
"string",
")",
"EndpointOption",
"{",
"return",
"func",
"(",
"ep",
"*",
"endpoint",
")",
"{",
"ep",
".",
"svcName",
"=",
"name",
"\n",
"ep",
".",
"svcID",
"=",
"id",
"\n",
"ep",
".",
"virtualIP",
"=",
"vip",
"\n",
"ep",
".",
"ingressPorts",
"=",
"ingressPorts",
"\n",
"ep",
".",
"svcAliases",
"=",
"aliases",
"\n",
"}",
"\n",
"}"
] | // CreateOptionService function returns an option setter for setting service binding configuration | [
"CreateOptionService",
"function",
"returns",
"an",
"option",
"setter",
"for",
"setting",
"service",
"binding",
"configuration"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/endpoint.go#L1018-L1026 | train |
docker/libnetwork | endpoint.go | CreateOptionMyAlias | func CreateOptionMyAlias(alias string) EndpointOption {
return func(ep *endpoint) {
ep.myAliases = append(ep.myAliases, alias)
}
} | go | func CreateOptionMyAlias(alias string) EndpointOption {
return func(ep *endpoint) {
ep.myAliases = append(ep.myAliases, alias)
}
} | [
"func",
"CreateOptionMyAlias",
"(",
"alias",
"string",
")",
"EndpointOption",
"{",
"return",
"func",
"(",
"ep",
"*",
"endpoint",
")",
"{",
"ep",
".",
"myAliases",
"=",
"append",
"(",
"ep",
".",
"myAliases",
",",
"alias",
")",
"\n",
"}",
"\n",
"}"
] | // CreateOptionMyAlias function returns an option setter for setting endpoint's self alias | [
"CreateOptionMyAlias",
"function",
"returns",
"an",
"option",
"setter",
"for",
"setting",
"endpoint",
"s",
"self",
"alias"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/endpoint.go#L1029-L1033 | train |
docker/libnetwork | iptables/conntrack.go | DeleteConntrackEntries | func DeleteConntrackEntries(nlh *netlink.Handle, ipv4List []net.IP, ipv6List []net.IP) (uint, uint, error) {
if !IsConntrackProgrammable(nlh) {
return 0, 0, ErrConntrackNotConfigurable
}
var totalIPv4FlowPurged uint
for _, ipAddress := range ipv4List {
flowPurged, err := purgeConntrackState(nlh, syscall.AF_INET, ipAddress)
if err != nil {
logrus.Warnf("Failed to delete conntrack state for %s: %v", ipAddress, err)
continue
}
totalIPv4FlowPurged += flowPurged
}
var totalIPv6FlowPurged uint
for _, ipAddress := range ipv6List {
flowPurged, err := purgeConntrackState(nlh, syscall.AF_INET6, ipAddress)
if err != nil {
logrus.Warnf("Failed to delete conntrack state for %s: %v", ipAddress, err)
continue
}
totalIPv6FlowPurged += flowPurged
}
logrus.Debugf("DeleteConntrackEntries purged ipv4:%d, ipv6:%d", totalIPv4FlowPurged, totalIPv6FlowPurged)
return totalIPv4FlowPurged, totalIPv6FlowPurged, nil
} | go | func DeleteConntrackEntries(nlh *netlink.Handle, ipv4List []net.IP, ipv6List []net.IP) (uint, uint, error) {
if !IsConntrackProgrammable(nlh) {
return 0, 0, ErrConntrackNotConfigurable
}
var totalIPv4FlowPurged uint
for _, ipAddress := range ipv4List {
flowPurged, err := purgeConntrackState(nlh, syscall.AF_INET, ipAddress)
if err != nil {
logrus.Warnf("Failed to delete conntrack state for %s: %v", ipAddress, err)
continue
}
totalIPv4FlowPurged += flowPurged
}
var totalIPv6FlowPurged uint
for _, ipAddress := range ipv6List {
flowPurged, err := purgeConntrackState(nlh, syscall.AF_INET6, ipAddress)
if err != nil {
logrus.Warnf("Failed to delete conntrack state for %s: %v", ipAddress, err)
continue
}
totalIPv6FlowPurged += flowPurged
}
logrus.Debugf("DeleteConntrackEntries purged ipv4:%d, ipv6:%d", totalIPv4FlowPurged, totalIPv6FlowPurged)
return totalIPv4FlowPurged, totalIPv6FlowPurged, nil
} | [
"func",
"DeleteConntrackEntries",
"(",
"nlh",
"*",
"netlink",
".",
"Handle",
",",
"ipv4List",
"[",
"]",
"net",
".",
"IP",
",",
"ipv6List",
"[",
"]",
"net",
".",
"IP",
")",
"(",
"uint",
",",
"uint",
",",
"error",
")",
"{",
"if",
"!",
"IsConntrackProgrammable",
"(",
"nlh",
")",
"{",
"return",
"0",
",",
"0",
",",
"ErrConntrackNotConfigurable",
"\n",
"}",
"\n\n",
"var",
"totalIPv4FlowPurged",
"uint",
"\n",
"for",
"_",
",",
"ipAddress",
":=",
"range",
"ipv4List",
"{",
"flowPurged",
",",
"err",
":=",
"purgeConntrackState",
"(",
"nlh",
",",
"syscall",
".",
"AF_INET",
",",
"ipAddress",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Warnf",
"(",
"\"",
"\"",
",",
"ipAddress",
",",
"err",
")",
"\n",
"continue",
"\n",
"}",
"\n",
"totalIPv4FlowPurged",
"+=",
"flowPurged",
"\n",
"}",
"\n\n",
"var",
"totalIPv6FlowPurged",
"uint",
"\n",
"for",
"_",
",",
"ipAddress",
":=",
"range",
"ipv6List",
"{",
"flowPurged",
",",
"err",
":=",
"purgeConntrackState",
"(",
"nlh",
",",
"syscall",
".",
"AF_INET6",
",",
"ipAddress",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Warnf",
"(",
"\"",
"\"",
",",
"ipAddress",
",",
"err",
")",
"\n",
"continue",
"\n",
"}",
"\n",
"totalIPv6FlowPurged",
"+=",
"flowPurged",
"\n",
"}",
"\n\n",
"logrus",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"totalIPv4FlowPurged",
",",
"totalIPv6FlowPurged",
")",
"\n",
"return",
"totalIPv4FlowPurged",
",",
"totalIPv6FlowPurged",
",",
"nil",
"\n",
"}"
] | // DeleteConntrackEntries deletes all the conntrack connections on the host for the specified IP
// Returns the number of flows deleted for IPv4, IPv6 else error | [
"DeleteConntrackEntries",
"deletes",
"all",
"the",
"conntrack",
"connections",
"on",
"the",
"host",
"for",
"the",
"specified",
"IP",
"Returns",
"the",
"number",
"of",
"flows",
"deleted",
"for",
"IPv4",
"IPv6",
"else",
"error"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/iptables/conntrack.go#L24-L51 | train |
docker/libnetwork | client/service.go | CmdServicePublish | func (cli *NetworkCli) CmdServicePublish(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "publish", "SERVICE[.NETWORK]", "Publish a new service on a network", false)
flAlias := opts.NewListOpts(netutils.ValidateAlias)
cmd.Var(&flAlias, []string{"-alias"}, "Add alias to self")
cmd.Require(flag.Exact, 1)
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
sn, nn := parseServiceName(cmd.Arg(0))
sc := serviceCreate{Name: sn, Network: nn, MyAliases: flAlias.GetAll()}
obj, _, err := readBody(cli.call("POST", "/services", sc, nil))
if err != nil {
return err
}
var replyID string
err = json.Unmarshal(obj, &replyID)
if err != nil {
return err
}
fmt.Fprintf(cli.out, "%s\n", replyID)
return nil
} | go | func (cli *NetworkCli) CmdServicePublish(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "publish", "SERVICE[.NETWORK]", "Publish a new service on a network", false)
flAlias := opts.NewListOpts(netutils.ValidateAlias)
cmd.Var(&flAlias, []string{"-alias"}, "Add alias to self")
cmd.Require(flag.Exact, 1)
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
sn, nn := parseServiceName(cmd.Arg(0))
sc := serviceCreate{Name: sn, Network: nn, MyAliases: flAlias.GetAll()}
obj, _, err := readBody(cli.call("POST", "/services", sc, nil))
if err != nil {
return err
}
var replyID string
err = json.Unmarshal(obj, &replyID)
if err != nil {
return err
}
fmt.Fprintf(cli.out, "%s\n", replyID)
return nil
} | [
"func",
"(",
"cli",
"*",
"NetworkCli",
")",
"CmdServicePublish",
"(",
"chain",
"string",
",",
"args",
"...",
"string",
")",
"error",
"{",
"cmd",
":=",
"cli",
".",
"Subcmd",
"(",
"chain",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"false",
")",
"\n",
"flAlias",
":=",
"opts",
".",
"NewListOpts",
"(",
"netutils",
".",
"ValidateAlias",
")",
"\n",
"cmd",
".",
"Var",
"(",
"&",
"flAlias",
",",
"[",
"]",
"string",
"{",
"\"",
"\"",
"}",
",",
"\"",
"\"",
")",
"\n",
"cmd",
".",
"Require",
"(",
"flag",
".",
"Exact",
",",
"1",
")",
"\n",
"err",
":=",
"cmd",
".",
"ParseFlags",
"(",
"args",
",",
"true",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"sn",
",",
"nn",
":=",
"parseServiceName",
"(",
"cmd",
".",
"Arg",
"(",
"0",
")",
")",
"\n",
"sc",
":=",
"serviceCreate",
"{",
"Name",
":",
"sn",
",",
"Network",
":",
"nn",
",",
"MyAliases",
":",
"flAlias",
".",
"GetAll",
"(",
")",
"}",
"\n",
"obj",
",",
"_",
",",
"err",
":=",
"readBody",
"(",
"cli",
".",
"call",
"(",
"\"",
"\"",
",",
"\"",
"\"",
",",
"sc",
",",
"nil",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"var",
"replyID",
"string",
"\n",
"err",
"=",
"json",
".",
"Unmarshal",
"(",
"obj",
",",
"&",
"replyID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"fmt",
".",
"Fprintf",
"(",
"cli",
".",
"out",
",",
"\"",
"\\n",
"\"",
",",
"replyID",
")",
"\n",
"return",
"nil",
"\n",
"}"
] | // CmdServicePublish handles service create UI | [
"CmdServicePublish",
"handles",
"service",
"create",
"UI"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/client/service.go#L165-L190 | train |
docker/libnetwork | client/service.go | CmdServiceUnpublish | func (cli *NetworkCli) CmdServiceUnpublish(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "unpublish", "SERVICE[.NETWORK]", "Removes a service", false)
force := cmd.Bool([]string{"f", "-force"}, false, "force unpublish service")
cmd.Require(flag.Exact, 1)
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
sn, nn := parseServiceName(cmd.Arg(0))
serviceID, err := lookupServiceID(cli, nn, sn)
if err != nil {
return err
}
sd := serviceDelete{Name: sn, Force: *force}
_, _, err = readBody(cli.call("DELETE", "/services/"+serviceID, sd, nil))
return err
} | go | func (cli *NetworkCli) CmdServiceUnpublish(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "unpublish", "SERVICE[.NETWORK]", "Removes a service", false)
force := cmd.Bool([]string{"f", "-force"}, false, "force unpublish service")
cmd.Require(flag.Exact, 1)
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
sn, nn := parseServiceName(cmd.Arg(0))
serviceID, err := lookupServiceID(cli, nn, sn)
if err != nil {
return err
}
sd := serviceDelete{Name: sn, Force: *force}
_, _, err = readBody(cli.call("DELETE", "/services/"+serviceID, sd, nil))
return err
} | [
"func",
"(",
"cli",
"*",
"NetworkCli",
")",
"CmdServiceUnpublish",
"(",
"chain",
"string",
",",
"args",
"...",
"string",
")",
"error",
"{",
"cmd",
":=",
"cli",
".",
"Subcmd",
"(",
"chain",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"false",
")",
"\n",
"force",
":=",
"cmd",
".",
"Bool",
"(",
"[",
"]",
"string",
"{",
"\"",
"\"",
",",
"\"",
"\"",
"}",
",",
"false",
",",
"\"",
"\"",
")",
"\n",
"cmd",
".",
"Require",
"(",
"flag",
".",
"Exact",
",",
"1",
")",
"\n",
"err",
":=",
"cmd",
".",
"ParseFlags",
"(",
"args",
",",
"true",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"sn",
",",
"nn",
":=",
"parseServiceName",
"(",
"cmd",
".",
"Arg",
"(",
"0",
")",
")",
"\n",
"serviceID",
",",
"err",
":=",
"lookupServiceID",
"(",
"cli",
",",
"nn",
",",
"sn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"sd",
":=",
"serviceDelete",
"{",
"Name",
":",
"sn",
",",
"Force",
":",
"*",
"force",
"}",
"\n",
"_",
",",
"_",
",",
"err",
"=",
"readBody",
"(",
"cli",
".",
"call",
"(",
"\"",
"\"",
",",
"\"",
"\"",
"+",
"serviceID",
",",
"sd",
",",
"nil",
")",
")",
"\n\n",
"return",
"err",
"\n",
"}"
] | // CmdServiceUnpublish handles service delete UI | [
"CmdServiceUnpublish",
"handles",
"service",
"delete",
"UI"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/client/service.go#L193-L212 | train |
docker/libnetwork | client/service.go | CmdServiceLs | func (cli *NetworkCli) CmdServiceLs(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "ls", "SERVICE", "Lists all the services on a network", false)
flNetwork := cmd.String([]string{"net", "-network"}, "", "Only show the services that are published on the specified network")
quiet := cmd.Bool([]string{"q", "-quiet"}, false, "Only display numeric IDs")
noTrunc := cmd.Bool([]string{"#notrunc", "-no-trunc"}, false, "Do not truncate the output")
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
var obj []byte
if *flNetwork == "" {
obj, _, err = readBody(cli.call("GET", "/services", nil, nil))
} else {
obj, _, err = readBody(cli.call("GET", "/services?network="+*flNetwork, nil, nil))
}
if err != nil {
return err
}
var serviceResources []serviceResource
err = json.Unmarshal(obj, &serviceResources)
if err != nil {
fmt.Println(err)
return err
}
wr := tabwriter.NewWriter(cli.out, 20, 1, 3, ' ', 0)
// unless quiet (-q) is specified, print field titles
if !*quiet {
fmt.Fprintln(wr, "SERVICE ID\tNAME\tNETWORK\tCONTAINER\tSANDBOX")
}
for _, sr := range serviceResources {
ID := sr.ID
bkID, sbID, err := getBackendID(cli, ID)
if err != nil {
return err
}
if !*noTrunc {
ID = stringid.TruncateID(ID)
bkID = stringid.TruncateID(bkID)
sbID = stringid.TruncateID(sbID)
}
if !*quiet {
fmt.Fprintf(wr, "%s\t%s\t%s\t%s\t%s\n", ID, sr.Name, sr.Network, bkID, sbID)
} else {
fmt.Fprintln(wr, ID)
}
}
wr.Flush()
return nil
} | go | func (cli *NetworkCli) CmdServiceLs(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "ls", "SERVICE", "Lists all the services on a network", false)
flNetwork := cmd.String([]string{"net", "-network"}, "", "Only show the services that are published on the specified network")
quiet := cmd.Bool([]string{"q", "-quiet"}, false, "Only display numeric IDs")
noTrunc := cmd.Bool([]string{"#notrunc", "-no-trunc"}, false, "Do not truncate the output")
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
var obj []byte
if *flNetwork == "" {
obj, _, err = readBody(cli.call("GET", "/services", nil, nil))
} else {
obj, _, err = readBody(cli.call("GET", "/services?network="+*flNetwork, nil, nil))
}
if err != nil {
return err
}
var serviceResources []serviceResource
err = json.Unmarshal(obj, &serviceResources)
if err != nil {
fmt.Println(err)
return err
}
wr := tabwriter.NewWriter(cli.out, 20, 1, 3, ' ', 0)
// unless quiet (-q) is specified, print field titles
if !*quiet {
fmt.Fprintln(wr, "SERVICE ID\tNAME\tNETWORK\tCONTAINER\tSANDBOX")
}
for _, sr := range serviceResources {
ID := sr.ID
bkID, sbID, err := getBackendID(cli, ID)
if err != nil {
return err
}
if !*noTrunc {
ID = stringid.TruncateID(ID)
bkID = stringid.TruncateID(bkID)
sbID = stringid.TruncateID(sbID)
}
if !*quiet {
fmt.Fprintf(wr, "%s\t%s\t%s\t%s\t%s\n", ID, sr.Name, sr.Network, bkID, sbID)
} else {
fmt.Fprintln(wr, ID)
}
}
wr.Flush()
return nil
} | [
"func",
"(",
"cli",
"*",
"NetworkCli",
")",
"CmdServiceLs",
"(",
"chain",
"string",
",",
"args",
"...",
"string",
")",
"error",
"{",
"cmd",
":=",
"cli",
".",
"Subcmd",
"(",
"chain",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"false",
")",
"\n",
"flNetwork",
":=",
"cmd",
".",
"String",
"(",
"[",
"]",
"string",
"{",
"\"",
"\"",
",",
"\"",
"\"",
"}",
",",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n",
"quiet",
":=",
"cmd",
".",
"Bool",
"(",
"[",
"]",
"string",
"{",
"\"",
"\"",
",",
"\"",
"\"",
"}",
",",
"false",
",",
"\"",
"\"",
")",
"\n",
"noTrunc",
":=",
"cmd",
".",
"Bool",
"(",
"[",
"]",
"string",
"{",
"\"",
"\"",
",",
"\"",
"\"",
"}",
",",
"false",
",",
"\"",
"\"",
")",
"\n\n",
"err",
":=",
"cmd",
".",
"ParseFlags",
"(",
"args",
",",
"true",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"var",
"obj",
"[",
"]",
"byte",
"\n",
"if",
"*",
"flNetwork",
"==",
"\"",
"\"",
"{",
"obj",
",",
"_",
",",
"err",
"=",
"readBody",
"(",
"cli",
".",
"call",
"(",
"\"",
"\"",
",",
"\"",
"\"",
",",
"nil",
",",
"nil",
")",
")",
"\n",
"}",
"else",
"{",
"obj",
",",
"_",
",",
"err",
"=",
"readBody",
"(",
"cli",
".",
"call",
"(",
"\"",
"\"",
",",
"\"",
"\"",
"+",
"*",
"flNetwork",
",",
"nil",
",",
"nil",
")",
")",
"\n",
"}",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"var",
"serviceResources",
"[",
"]",
"serviceResource",
"\n",
"err",
"=",
"json",
".",
"Unmarshal",
"(",
"obj",
",",
"&",
"serviceResources",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"fmt",
".",
"Println",
"(",
"err",
")",
"\n",
"return",
"err",
"\n",
"}",
"\n\n",
"wr",
":=",
"tabwriter",
".",
"NewWriter",
"(",
"cli",
".",
"out",
",",
"20",
",",
"1",
",",
"3",
",",
"' '",
",",
"0",
")",
"\n",
"// unless quiet (-q) is specified, print field titles",
"if",
"!",
"*",
"quiet",
"{",
"fmt",
".",
"Fprintln",
"(",
"wr",
",",
"\"",
"\\t",
"\\t",
"\\t",
"\\t",
"\"",
")",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"sr",
":=",
"range",
"serviceResources",
"{",
"ID",
":=",
"sr",
".",
"ID",
"\n",
"bkID",
",",
"sbID",
",",
"err",
":=",
"getBackendID",
"(",
"cli",
",",
"ID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"if",
"!",
"*",
"noTrunc",
"{",
"ID",
"=",
"stringid",
".",
"TruncateID",
"(",
"ID",
")",
"\n",
"bkID",
"=",
"stringid",
".",
"TruncateID",
"(",
"bkID",
")",
"\n",
"sbID",
"=",
"stringid",
".",
"TruncateID",
"(",
"sbID",
")",
"\n",
"}",
"\n",
"if",
"!",
"*",
"quiet",
"{",
"fmt",
".",
"Fprintf",
"(",
"wr",
",",
"\"",
"\\t",
"\\t",
"\\t",
"\\t",
"\\n",
"\"",
",",
"ID",
",",
"sr",
".",
"Name",
",",
"sr",
".",
"Network",
",",
"bkID",
",",
"sbID",
")",
"\n",
"}",
"else",
"{",
"fmt",
".",
"Fprintln",
"(",
"wr",
",",
"ID",
")",
"\n",
"}",
"\n",
"}",
"\n",
"wr",
".",
"Flush",
"(",
")",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // CmdServiceLs handles service list UI | [
"CmdServiceLs",
"handles",
"service",
"list",
"UI"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/client/service.go#L215-L269 | train |
docker/libnetwork | client/service.go | CmdServiceInfo | func (cli *NetworkCli) CmdServiceInfo(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "info", "SERVICE[.NETWORK]", "Displays detailed information about a service", false)
cmd.Require(flag.Min, 1)
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
sn, nn := parseServiceName(cmd.Arg(0))
serviceID, err := lookupServiceID(cli, nn, sn)
if err != nil {
return err
}
obj, _, err := readBody(cli.call("GET", "/services/"+serviceID, nil, nil))
if err != nil {
return err
}
sr := &serviceResource{}
if err := json.NewDecoder(bytes.NewReader(obj)).Decode(sr); err != nil {
return err
}
fmt.Fprintf(cli.out, "Service Id: %s\n", sr.ID)
fmt.Fprintf(cli.out, "\tName: %s\n", sr.Name)
fmt.Fprintf(cli.out, "\tNetwork: %s\n", sr.Network)
return nil
} | go | func (cli *NetworkCli) CmdServiceInfo(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "info", "SERVICE[.NETWORK]", "Displays detailed information about a service", false)
cmd.Require(flag.Min, 1)
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
sn, nn := parseServiceName(cmd.Arg(0))
serviceID, err := lookupServiceID(cli, nn, sn)
if err != nil {
return err
}
obj, _, err := readBody(cli.call("GET", "/services/"+serviceID, nil, nil))
if err != nil {
return err
}
sr := &serviceResource{}
if err := json.NewDecoder(bytes.NewReader(obj)).Decode(sr); err != nil {
return err
}
fmt.Fprintf(cli.out, "Service Id: %s\n", sr.ID)
fmt.Fprintf(cli.out, "\tName: %s\n", sr.Name)
fmt.Fprintf(cli.out, "\tNetwork: %s\n", sr.Network)
return nil
} | [
"func",
"(",
"cli",
"*",
"NetworkCli",
")",
"CmdServiceInfo",
"(",
"chain",
"string",
",",
"args",
"...",
"string",
")",
"error",
"{",
"cmd",
":=",
"cli",
".",
"Subcmd",
"(",
"chain",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"false",
")",
"\n",
"cmd",
".",
"Require",
"(",
"flag",
".",
"Min",
",",
"1",
")",
"\n\n",
"err",
":=",
"cmd",
".",
"ParseFlags",
"(",
"args",
",",
"true",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"sn",
",",
"nn",
":=",
"parseServiceName",
"(",
"cmd",
".",
"Arg",
"(",
"0",
")",
")",
"\n",
"serviceID",
",",
"err",
":=",
"lookupServiceID",
"(",
"cli",
",",
"nn",
",",
"sn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"obj",
",",
"_",
",",
"err",
":=",
"readBody",
"(",
"cli",
".",
"call",
"(",
"\"",
"\"",
",",
"\"",
"\"",
"+",
"serviceID",
",",
"nil",
",",
"nil",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"sr",
":=",
"&",
"serviceResource",
"{",
"}",
"\n",
"if",
"err",
":=",
"json",
".",
"NewDecoder",
"(",
"bytes",
".",
"NewReader",
"(",
"obj",
")",
")",
".",
"Decode",
"(",
"sr",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"fmt",
".",
"Fprintf",
"(",
"cli",
".",
"out",
",",
"\"",
"\\n",
"\"",
",",
"sr",
".",
"ID",
")",
"\n",
"fmt",
".",
"Fprintf",
"(",
"cli",
".",
"out",
",",
"\"",
"\\t",
"\\n",
"\"",
",",
"sr",
".",
"Name",
")",
"\n",
"fmt",
".",
"Fprintf",
"(",
"cli",
".",
"out",
",",
"\"",
"\\t",
"\\n",
"\"",
",",
"sr",
".",
"Network",
")",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // CmdServiceInfo handles service info UI | [
"CmdServiceInfo",
"handles",
"service",
"info",
"UI"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/client/service.go#L294-L324 | train |
docker/libnetwork | client/service.go | CmdServiceAttach | func (cli *NetworkCli) CmdServiceAttach(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "attach", "CONTAINER SERVICE[.NETWORK]", "Sets a container as a service backend", false)
flAlias := opts.NewListOpts(netutils.ValidateAlias)
cmd.Var(&flAlias, []string{"-alias"}, "Add alias for another container")
cmd.Require(flag.Min, 2)
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
containerID, err := lookupContainerID(cli, cmd.Arg(0))
if err != nil {
return err
}
sandboxID, err := lookupSandboxID(cli, containerID)
if err != nil {
return err
}
sn, nn := parseServiceName(cmd.Arg(1))
serviceID, err := lookupServiceID(cli, nn, sn)
if err != nil {
return err
}
nc := serviceAttach{SandboxID: sandboxID, Aliases: flAlias.GetAll()}
_, _, err = readBody(cli.call("POST", "/services/"+serviceID+"/backend", nc, nil))
return err
} | go | func (cli *NetworkCli) CmdServiceAttach(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "attach", "CONTAINER SERVICE[.NETWORK]", "Sets a container as a service backend", false)
flAlias := opts.NewListOpts(netutils.ValidateAlias)
cmd.Var(&flAlias, []string{"-alias"}, "Add alias for another container")
cmd.Require(flag.Min, 2)
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
containerID, err := lookupContainerID(cli, cmd.Arg(0))
if err != nil {
return err
}
sandboxID, err := lookupSandboxID(cli, containerID)
if err != nil {
return err
}
sn, nn := parseServiceName(cmd.Arg(1))
serviceID, err := lookupServiceID(cli, nn, sn)
if err != nil {
return err
}
nc := serviceAttach{SandboxID: sandboxID, Aliases: flAlias.GetAll()}
_, _, err = readBody(cli.call("POST", "/services/"+serviceID+"/backend", nc, nil))
return err
} | [
"func",
"(",
"cli",
"*",
"NetworkCli",
")",
"CmdServiceAttach",
"(",
"chain",
"string",
",",
"args",
"...",
"string",
")",
"error",
"{",
"cmd",
":=",
"cli",
".",
"Subcmd",
"(",
"chain",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"false",
")",
"\n",
"flAlias",
":=",
"opts",
".",
"NewListOpts",
"(",
"netutils",
".",
"ValidateAlias",
")",
"\n",
"cmd",
".",
"Var",
"(",
"&",
"flAlias",
",",
"[",
"]",
"string",
"{",
"\"",
"\"",
"}",
",",
"\"",
"\"",
")",
"\n",
"cmd",
".",
"Require",
"(",
"flag",
".",
"Min",
",",
"2",
")",
"\n",
"err",
":=",
"cmd",
".",
"ParseFlags",
"(",
"args",
",",
"true",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"containerID",
",",
"err",
":=",
"lookupContainerID",
"(",
"cli",
",",
"cmd",
".",
"Arg",
"(",
"0",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"sandboxID",
",",
"err",
":=",
"lookupSandboxID",
"(",
"cli",
",",
"containerID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"sn",
",",
"nn",
":=",
"parseServiceName",
"(",
"cmd",
".",
"Arg",
"(",
"1",
")",
")",
"\n",
"serviceID",
",",
"err",
":=",
"lookupServiceID",
"(",
"cli",
",",
"nn",
",",
"sn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"nc",
":=",
"serviceAttach",
"{",
"SandboxID",
":",
"sandboxID",
",",
"Aliases",
":",
"flAlias",
".",
"GetAll",
"(",
")",
"}",
"\n\n",
"_",
",",
"_",
",",
"err",
"=",
"readBody",
"(",
"cli",
".",
"call",
"(",
"\"",
"\"",
",",
"\"",
"\"",
"+",
"serviceID",
"+",
"\"",
"\"",
",",
"nc",
",",
"nil",
")",
")",
"\n\n",
"return",
"err",
"\n",
"}"
] | // CmdServiceAttach handles service attach UI | [
"CmdServiceAttach",
"handles",
"service",
"attach",
"UI"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/client/service.go#L327-L358 | train |
docker/libnetwork | client/service.go | CmdServiceDetach | func (cli *NetworkCli) CmdServiceDetach(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "detach", "CONTAINER SERVICE", "Removes a container from service backend", false)
cmd.Require(flag.Min, 2)
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
sn, nn := parseServiceName(cmd.Arg(1))
containerID, err := lookupContainerID(cli, cmd.Arg(0))
if err != nil {
return err
}
sandboxID, err := lookupSandboxID(cli, containerID)
if err != nil {
return err
}
serviceID, err := lookupServiceID(cli, nn, sn)
if err != nil {
return err
}
_, _, err = readBody(cli.call("DELETE", "/services/"+serviceID+"/backend/"+sandboxID, nil, nil))
if err != nil {
return err
}
return nil
} | go | func (cli *NetworkCli) CmdServiceDetach(chain string, args ...string) error {
cmd := cli.Subcmd(chain, "detach", "CONTAINER SERVICE", "Removes a container from service backend", false)
cmd.Require(flag.Min, 2)
err := cmd.ParseFlags(args, true)
if err != nil {
return err
}
sn, nn := parseServiceName(cmd.Arg(1))
containerID, err := lookupContainerID(cli, cmd.Arg(0))
if err != nil {
return err
}
sandboxID, err := lookupSandboxID(cli, containerID)
if err != nil {
return err
}
serviceID, err := lookupServiceID(cli, nn, sn)
if err != nil {
return err
}
_, _, err = readBody(cli.call("DELETE", "/services/"+serviceID+"/backend/"+sandboxID, nil, nil))
if err != nil {
return err
}
return nil
} | [
"func",
"(",
"cli",
"*",
"NetworkCli",
")",
"CmdServiceDetach",
"(",
"chain",
"string",
",",
"args",
"...",
"string",
")",
"error",
"{",
"cmd",
":=",
"cli",
".",
"Subcmd",
"(",
"chain",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"false",
")",
"\n",
"cmd",
".",
"Require",
"(",
"flag",
".",
"Min",
",",
"2",
")",
"\n",
"err",
":=",
"cmd",
".",
"ParseFlags",
"(",
"args",
",",
"true",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"sn",
",",
"nn",
":=",
"parseServiceName",
"(",
"cmd",
".",
"Arg",
"(",
"1",
")",
")",
"\n",
"containerID",
",",
"err",
":=",
"lookupContainerID",
"(",
"cli",
",",
"cmd",
".",
"Arg",
"(",
"0",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"sandboxID",
",",
"err",
":=",
"lookupSandboxID",
"(",
"cli",
",",
"containerID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"serviceID",
",",
"err",
":=",
"lookupServiceID",
"(",
"cli",
",",
"nn",
",",
"sn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"_",
",",
"_",
",",
"err",
"=",
"readBody",
"(",
"cli",
".",
"call",
"(",
"\"",
"\"",
",",
"\"",
"\"",
"+",
"serviceID",
"+",
"\"",
"\"",
"+",
"sandboxID",
",",
"nil",
",",
"nil",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // CmdServiceDetach handles service detach UI | [
"CmdServiceDetach",
"handles",
"service",
"detach",
"UI"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/client/service.go#L361-L390 | train |
docker/libnetwork | ipam/store.go | SetValue | func (aSpace *addrSpace) SetValue(value []byte) error {
rc := &addrSpace{subnets: make(map[SubnetKey]*PoolData)}
if err := json.Unmarshal(value, rc); err != nil {
return err
}
aSpace.subnets = rc.subnets
return nil
} | go | func (aSpace *addrSpace) SetValue(value []byte) error {
rc := &addrSpace{subnets: make(map[SubnetKey]*PoolData)}
if err := json.Unmarshal(value, rc); err != nil {
return err
}
aSpace.subnets = rc.subnets
return nil
} | [
"func",
"(",
"aSpace",
"*",
"addrSpace",
")",
"SetValue",
"(",
"value",
"[",
"]",
"byte",
")",
"error",
"{",
"rc",
":=",
"&",
"addrSpace",
"{",
"subnets",
":",
"make",
"(",
"map",
"[",
"SubnetKey",
"]",
"*",
"PoolData",
")",
"}",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"value",
",",
"rc",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"aSpace",
".",
"subnets",
"=",
"rc",
".",
"subnets",
"\n",
"return",
"nil",
"\n",
"}"
] | // SetValue unmarshalls the data from the KV store. | [
"SetValue",
"unmarshalls",
"the",
"data",
"from",
"the",
"KV",
"store",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipam/store.go#L36-L43 | train |
docker/libnetwork | ipvs/ipvs.go | New | func New(path string) (*Handle, error) {
setup()
n := netns.None()
if path != "" {
var err error
n, err = netns.GetFromPath(path)
if err != nil {
return nil, err
}
}
defer n.Close()
sock, err := nl.GetNetlinkSocketAt(n, netns.None(), syscall.NETLINK_GENERIC)
if err != nil {
return nil, err
}
// Add operation timeout to avoid deadlocks
tv := syscall.NsecToTimeval(netlinkSendSocketTimeout.Nanoseconds())
if err := sock.SetSendTimeout(&tv); err != nil {
return nil, err
}
tv = syscall.NsecToTimeval(netlinkRecvSocketsTimeout.Nanoseconds())
if err := sock.SetReceiveTimeout(&tv); err != nil {
return nil, err
}
return &Handle{sock: sock}, nil
} | go | func New(path string) (*Handle, error) {
setup()
n := netns.None()
if path != "" {
var err error
n, err = netns.GetFromPath(path)
if err != nil {
return nil, err
}
}
defer n.Close()
sock, err := nl.GetNetlinkSocketAt(n, netns.None(), syscall.NETLINK_GENERIC)
if err != nil {
return nil, err
}
// Add operation timeout to avoid deadlocks
tv := syscall.NsecToTimeval(netlinkSendSocketTimeout.Nanoseconds())
if err := sock.SetSendTimeout(&tv); err != nil {
return nil, err
}
tv = syscall.NsecToTimeval(netlinkRecvSocketsTimeout.Nanoseconds())
if err := sock.SetReceiveTimeout(&tv); err != nil {
return nil, err
}
return &Handle{sock: sock}, nil
} | [
"func",
"New",
"(",
"path",
"string",
")",
"(",
"*",
"Handle",
",",
"error",
")",
"{",
"setup",
"(",
")",
"\n\n",
"n",
":=",
"netns",
".",
"None",
"(",
")",
"\n",
"if",
"path",
"!=",
"\"",
"\"",
"{",
"var",
"err",
"error",
"\n",
"n",
",",
"err",
"=",
"netns",
".",
"GetFromPath",
"(",
"path",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"defer",
"n",
".",
"Close",
"(",
")",
"\n\n",
"sock",
",",
"err",
":=",
"nl",
".",
"GetNetlinkSocketAt",
"(",
"n",
",",
"netns",
".",
"None",
"(",
")",
",",
"syscall",
".",
"NETLINK_GENERIC",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"// Add operation timeout to avoid deadlocks",
"tv",
":=",
"syscall",
".",
"NsecToTimeval",
"(",
"netlinkSendSocketTimeout",
".",
"Nanoseconds",
"(",
")",
")",
"\n",
"if",
"err",
":=",
"sock",
".",
"SetSendTimeout",
"(",
"&",
"tv",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"tv",
"=",
"syscall",
".",
"NsecToTimeval",
"(",
"netlinkRecvSocketsTimeout",
".",
"Nanoseconds",
"(",
")",
")",
"\n",
"if",
"err",
":=",
"sock",
".",
"SetReceiveTimeout",
"(",
"&",
"tv",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"&",
"Handle",
"{",
"sock",
":",
"sock",
"}",
",",
"nil",
"\n",
"}"
] | // New provides a new ipvs handle in the namespace pointed to by the
// passed path. It will return a valid handle or an error in case an
// error occurred while creating the handle. | [
"New",
"provides",
"a",
"new",
"ipvs",
"handle",
"in",
"the",
"namespace",
"pointed",
"to",
"by",
"the",
"passed",
"path",
".",
"It",
"will",
"return",
"a",
"valid",
"handle",
"or",
"an",
"error",
"in",
"case",
"an",
"error",
"occurred",
"while",
"creating",
"the",
"handle",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/ipvs.go#L88-L116 | train |
docker/libnetwork | ipvs/ipvs.go | NewService | func (i *Handle) NewService(s *Service) error {
return i.doCmd(s, nil, ipvsCmdNewService)
} | go | func (i *Handle) NewService(s *Service) error {
return i.doCmd(s, nil, ipvsCmdNewService)
} | [
"func",
"(",
"i",
"*",
"Handle",
")",
"NewService",
"(",
"s",
"*",
"Service",
")",
"error",
"{",
"return",
"i",
".",
"doCmd",
"(",
"s",
",",
"nil",
",",
"ipvsCmdNewService",
")",
"\n",
"}"
] | // NewService creates a new ipvs service in the passed handle. | [
"NewService",
"creates",
"a",
"new",
"ipvs",
"service",
"in",
"the",
"passed",
"handle",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/ipvs.go#L127-L129 | train |
docker/libnetwork | ipvs/ipvs.go | IsServicePresent | func (i *Handle) IsServicePresent(s *Service) bool {
return nil == i.doCmd(s, nil, ipvsCmdGetService)
} | go | func (i *Handle) IsServicePresent(s *Service) bool {
return nil == i.doCmd(s, nil, ipvsCmdGetService)
} | [
"func",
"(",
"i",
"*",
"Handle",
")",
"IsServicePresent",
"(",
"s",
"*",
"Service",
")",
"bool",
"{",
"return",
"nil",
"==",
"i",
".",
"doCmd",
"(",
"s",
",",
"nil",
",",
"ipvsCmdGetService",
")",
"\n",
"}"
] | // IsServicePresent queries for the ipvs service in the passed handle. | [
"IsServicePresent",
"queries",
"for",
"the",
"ipvs",
"service",
"in",
"the",
"passed",
"handle",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/ipvs.go#L132-L134 | train |
docker/libnetwork | ipvs/ipvs.go | UpdateService | func (i *Handle) UpdateService(s *Service) error {
return i.doCmd(s, nil, ipvsCmdSetService)
} | go | func (i *Handle) UpdateService(s *Service) error {
return i.doCmd(s, nil, ipvsCmdSetService)
} | [
"func",
"(",
"i",
"*",
"Handle",
")",
"UpdateService",
"(",
"s",
"*",
"Service",
")",
"error",
"{",
"return",
"i",
".",
"doCmd",
"(",
"s",
",",
"nil",
",",
"ipvsCmdSetService",
")",
"\n",
"}"
] | // UpdateService updates an already existing service in the passed
// handle. | [
"UpdateService",
"updates",
"an",
"already",
"existing",
"service",
"in",
"the",
"passed",
"handle",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/ipvs.go#L138-L140 | train |
docker/libnetwork | ipvs/ipvs.go | DelService | func (i *Handle) DelService(s *Service) error {
return i.doCmd(s, nil, ipvsCmdDelService)
} | go | func (i *Handle) DelService(s *Service) error {
return i.doCmd(s, nil, ipvsCmdDelService)
} | [
"func",
"(",
"i",
"*",
"Handle",
")",
"DelService",
"(",
"s",
"*",
"Service",
")",
"error",
"{",
"return",
"i",
".",
"doCmd",
"(",
"s",
",",
"nil",
",",
"ipvsCmdDelService",
")",
"\n",
"}"
] | // DelService deletes an already existing service in the passed
// handle. | [
"DelService",
"deletes",
"an",
"already",
"existing",
"service",
"in",
"the",
"passed",
"handle",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/ipvs.go#L144-L146 | train |
docker/libnetwork | ipvs/ipvs.go | Flush | func (i *Handle) Flush() error {
_, err := i.doCmdWithoutAttr(ipvsCmdFlush)
return err
} | go | func (i *Handle) Flush() error {
_, err := i.doCmdWithoutAttr(ipvsCmdFlush)
return err
} | [
"func",
"(",
"i",
"*",
"Handle",
")",
"Flush",
"(",
")",
"error",
"{",
"_",
",",
"err",
":=",
"i",
".",
"doCmdWithoutAttr",
"(",
"ipvsCmdFlush",
")",
"\n",
"return",
"err",
"\n",
"}"
] | // Flush deletes all existing services in the passed
// handle. | [
"Flush",
"deletes",
"all",
"existing",
"services",
"in",
"the",
"passed",
"handle",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/ipvs.go#L150-L153 | train |
docker/libnetwork | ipvs/ipvs.go | NewDestination | func (i *Handle) NewDestination(s *Service, d *Destination) error {
return i.doCmd(s, d, ipvsCmdNewDest)
} | go | func (i *Handle) NewDestination(s *Service, d *Destination) error {
return i.doCmd(s, d, ipvsCmdNewDest)
} | [
"func",
"(",
"i",
"*",
"Handle",
")",
"NewDestination",
"(",
"s",
"*",
"Service",
",",
"d",
"*",
"Destination",
")",
"error",
"{",
"return",
"i",
".",
"doCmd",
"(",
"s",
",",
"d",
",",
"ipvsCmdNewDest",
")",
"\n",
"}"
] | // NewDestination creates a new real server in the passed ipvs
// service which should already be existing in the passed handle. | [
"NewDestination",
"creates",
"a",
"new",
"real",
"server",
"in",
"the",
"passed",
"ipvs",
"service",
"which",
"should",
"already",
"be",
"existing",
"in",
"the",
"passed",
"handle",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/ipvs.go#L157-L159 | train |
docker/libnetwork | ipvs/ipvs.go | UpdateDestination | func (i *Handle) UpdateDestination(s *Service, d *Destination) error {
return i.doCmd(s, d, ipvsCmdSetDest)
} | go | func (i *Handle) UpdateDestination(s *Service, d *Destination) error {
return i.doCmd(s, d, ipvsCmdSetDest)
} | [
"func",
"(",
"i",
"*",
"Handle",
")",
"UpdateDestination",
"(",
"s",
"*",
"Service",
",",
"d",
"*",
"Destination",
")",
"error",
"{",
"return",
"i",
".",
"doCmd",
"(",
"s",
",",
"d",
",",
"ipvsCmdSetDest",
")",
"\n",
"}"
] | // UpdateDestination updates an already existing real server in the
// passed ipvs service in the passed handle. | [
"UpdateDestination",
"updates",
"an",
"already",
"existing",
"real",
"server",
"in",
"the",
"passed",
"ipvs",
"service",
"in",
"the",
"passed",
"handle",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/ipvs.go#L163-L165 | train |
docker/libnetwork | ipvs/ipvs.go | DelDestination | func (i *Handle) DelDestination(s *Service, d *Destination) error {
return i.doCmd(s, d, ipvsCmdDelDest)
} | go | func (i *Handle) DelDestination(s *Service, d *Destination) error {
return i.doCmd(s, d, ipvsCmdDelDest)
} | [
"func",
"(",
"i",
"*",
"Handle",
")",
"DelDestination",
"(",
"s",
"*",
"Service",
",",
"d",
"*",
"Destination",
")",
"error",
"{",
"return",
"i",
".",
"doCmd",
"(",
"s",
",",
"d",
",",
"ipvsCmdDelDest",
")",
"\n",
"}"
] | // DelDestination deletes an already existing real server in the
// passed ipvs service in the passed handle. | [
"DelDestination",
"deletes",
"an",
"already",
"existing",
"real",
"server",
"in",
"the",
"passed",
"ipvs",
"service",
"in",
"the",
"passed",
"handle",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/ipvs.go#L169-L171 | train |
docker/libnetwork | ipvs/ipvs.go | GetDestinations | func (i *Handle) GetDestinations(s *Service) ([]*Destination, error) {
return i.doGetDestinationsCmd(s, nil)
} | go | func (i *Handle) GetDestinations(s *Service) ([]*Destination, error) {
return i.doGetDestinationsCmd(s, nil)
} | [
"func",
"(",
"i",
"*",
"Handle",
")",
"GetDestinations",
"(",
"s",
"*",
"Service",
")",
"(",
"[",
"]",
"*",
"Destination",
",",
"error",
")",
"{",
"return",
"i",
".",
"doGetDestinationsCmd",
"(",
"s",
",",
"nil",
")",
"\n",
"}"
] | // GetDestinations returns an array of Destinations configured for this Service | [
"GetDestinations",
"returns",
"an",
"array",
"of",
"Destinations",
"configured",
"for",
"this",
"Service"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/ipvs.go#L179-L181 | train |
docker/libnetwork | ipvs/ipvs.go | GetService | func (i *Handle) GetService(s *Service) (*Service, error) {
res, err := i.doGetServicesCmd(s)
if err != nil {
return nil, err
}
// We are looking for exactly one service otherwise error out
if len(res) != 1 {
return nil, fmt.Errorf("Expected only one service obtained=%d", len(res))
}
return res[0], nil
} | go | func (i *Handle) GetService(s *Service) (*Service, error) {
res, err := i.doGetServicesCmd(s)
if err != nil {
return nil, err
}
// We are looking for exactly one service otherwise error out
if len(res) != 1 {
return nil, fmt.Errorf("Expected only one service obtained=%d", len(res))
}
return res[0], nil
} | [
"func",
"(",
"i",
"*",
"Handle",
")",
"GetService",
"(",
"s",
"*",
"Service",
")",
"(",
"*",
"Service",
",",
"error",
")",
"{",
"res",
",",
"err",
":=",
"i",
".",
"doGetServicesCmd",
"(",
"s",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"// We are looking for exactly one service otherwise error out",
"if",
"len",
"(",
"res",
")",
"!=",
"1",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"len",
"(",
"res",
")",
")",
"\n",
"}",
"\n\n",
"return",
"res",
"[",
"0",
"]",
",",
"nil",
"\n",
"}"
] | // GetService gets details of a specific IPVS services, useful in updating statisics etc., | [
"GetService",
"gets",
"details",
"of",
"a",
"specific",
"IPVS",
"services",
"useful",
"in",
"updating",
"statisics",
"etc",
"."
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/ipvs/ipvs.go#L184-L197 | train |
docker/libnetwork | portmapper/mapper.go | NewWithPortAllocator | func NewWithPortAllocator(allocator *portallocator.PortAllocator, proxyPath string) *PortMapper {
return &PortMapper{
currentMappings: make(map[string]*mapping),
Allocator: allocator,
proxyPath: proxyPath,
}
} | go | func NewWithPortAllocator(allocator *portallocator.PortAllocator, proxyPath string) *PortMapper {
return &PortMapper{
currentMappings: make(map[string]*mapping),
Allocator: allocator,
proxyPath: proxyPath,
}
} | [
"func",
"NewWithPortAllocator",
"(",
"allocator",
"*",
"portallocator",
".",
"PortAllocator",
",",
"proxyPath",
"string",
")",
"*",
"PortMapper",
"{",
"return",
"&",
"PortMapper",
"{",
"currentMappings",
":",
"make",
"(",
"map",
"[",
"string",
"]",
"*",
"mapping",
")",
",",
"Allocator",
":",
"allocator",
",",
"proxyPath",
":",
"proxyPath",
",",
"}",
"\n",
"}"
] | // NewWithPortAllocator returns a new instance of PortMapper which will use the specified PortAllocator | [
"NewWithPortAllocator",
"returns",
"a",
"new",
"instance",
"of",
"PortMapper",
"which",
"will",
"use",
"the",
"specified",
"PortAllocator"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/portmapper/mapper.go#L39-L45 | train |
docker/libnetwork | portmapper/mapper.go | Map | func (pm *PortMapper) Map(container net.Addr, hostIP net.IP, hostPort int, useProxy bool) (host net.Addr, err error) {
return pm.MapRange(container, hostIP, hostPort, hostPort, useProxy)
} | go | func (pm *PortMapper) Map(container net.Addr, hostIP net.IP, hostPort int, useProxy bool) (host net.Addr, err error) {
return pm.MapRange(container, hostIP, hostPort, hostPort, useProxy)
} | [
"func",
"(",
"pm",
"*",
"PortMapper",
")",
"Map",
"(",
"container",
"net",
".",
"Addr",
",",
"hostIP",
"net",
".",
"IP",
",",
"hostPort",
"int",
",",
"useProxy",
"bool",
")",
"(",
"host",
"net",
".",
"Addr",
",",
"err",
"error",
")",
"{",
"return",
"pm",
".",
"MapRange",
"(",
"container",
",",
"hostIP",
",",
"hostPort",
",",
"hostPort",
",",
"useProxy",
")",
"\n",
"}"
] | // Map maps the specified container transport address to the host's network address and transport port | [
"Map",
"maps",
"the",
"specified",
"container",
"transport",
"address",
"to",
"the",
"host",
"s",
"network",
"address",
"and",
"transport",
"port"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/portmapper/mapper.go#L48-L50 | train |
docker/libnetwork | portmapper/mapper.go | Unmap | func (pm *PortMapper) Unmap(host net.Addr) error {
pm.lock.Lock()
defer pm.lock.Unlock()
key := getKey(host)
data, exists := pm.currentMappings[key]
if !exists {
return ErrPortNotMapped
}
if data.userlandProxy != nil {
data.userlandProxy.Stop()
}
delete(pm.currentMappings, key)
containerIP, containerPort := getIPAndPort(data.container)
hostIP, hostPort := getIPAndPort(data.host)
if err := pm.DeleteForwardingTableEntry(data.proto, hostIP, hostPort, containerIP.String(), containerPort); err != nil {
logrus.Errorf("Error on iptables delete: %s", err)
}
switch a := host.(type) {
case *net.TCPAddr:
return pm.Allocator.ReleasePort(a.IP, "tcp", a.Port)
case *net.UDPAddr:
return pm.Allocator.ReleasePort(a.IP, "udp", a.Port)
case *sctp.SCTPAddr:
if len(a.IP) == 0 {
return ErrSCTPAddrNoIP
}
return pm.Allocator.ReleasePort(a.IP[0], "sctp", a.Port)
}
return ErrUnknownBackendAddressType
} | go | func (pm *PortMapper) Unmap(host net.Addr) error {
pm.lock.Lock()
defer pm.lock.Unlock()
key := getKey(host)
data, exists := pm.currentMappings[key]
if !exists {
return ErrPortNotMapped
}
if data.userlandProxy != nil {
data.userlandProxy.Stop()
}
delete(pm.currentMappings, key)
containerIP, containerPort := getIPAndPort(data.container)
hostIP, hostPort := getIPAndPort(data.host)
if err := pm.DeleteForwardingTableEntry(data.proto, hostIP, hostPort, containerIP.String(), containerPort); err != nil {
logrus.Errorf("Error on iptables delete: %s", err)
}
switch a := host.(type) {
case *net.TCPAddr:
return pm.Allocator.ReleasePort(a.IP, "tcp", a.Port)
case *net.UDPAddr:
return pm.Allocator.ReleasePort(a.IP, "udp", a.Port)
case *sctp.SCTPAddr:
if len(a.IP) == 0 {
return ErrSCTPAddrNoIP
}
return pm.Allocator.ReleasePort(a.IP[0], "sctp", a.Port)
}
return ErrUnknownBackendAddressType
} | [
"func",
"(",
"pm",
"*",
"PortMapper",
")",
"Unmap",
"(",
"host",
"net",
".",
"Addr",
")",
"error",
"{",
"pm",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"pm",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n\n",
"key",
":=",
"getKey",
"(",
"host",
")",
"\n",
"data",
",",
"exists",
":=",
"pm",
".",
"currentMappings",
"[",
"key",
"]",
"\n",
"if",
"!",
"exists",
"{",
"return",
"ErrPortNotMapped",
"\n",
"}",
"\n\n",
"if",
"data",
".",
"userlandProxy",
"!=",
"nil",
"{",
"data",
".",
"userlandProxy",
".",
"Stop",
"(",
")",
"\n",
"}",
"\n\n",
"delete",
"(",
"pm",
".",
"currentMappings",
",",
"key",
")",
"\n\n",
"containerIP",
",",
"containerPort",
":=",
"getIPAndPort",
"(",
"data",
".",
"container",
")",
"\n",
"hostIP",
",",
"hostPort",
":=",
"getIPAndPort",
"(",
"data",
".",
"host",
")",
"\n",
"if",
"err",
":=",
"pm",
".",
"DeleteForwardingTableEntry",
"(",
"data",
".",
"proto",
",",
"hostIP",
",",
"hostPort",
",",
"containerIP",
".",
"String",
"(",
")",
",",
"containerPort",
")",
";",
"err",
"!=",
"nil",
"{",
"logrus",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"switch",
"a",
":=",
"host",
".",
"(",
"type",
")",
"{",
"case",
"*",
"net",
".",
"TCPAddr",
":",
"return",
"pm",
".",
"Allocator",
".",
"ReleasePort",
"(",
"a",
".",
"IP",
",",
"\"",
"\"",
",",
"a",
".",
"Port",
")",
"\n",
"case",
"*",
"net",
".",
"UDPAddr",
":",
"return",
"pm",
".",
"Allocator",
".",
"ReleasePort",
"(",
"a",
".",
"IP",
",",
"\"",
"\"",
",",
"a",
".",
"Port",
")",
"\n",
"case",
"*",
"sctp",
".",
"SCTPAddr",
":",
"if",
"len",
"(",
"a",
".",
"IP",
")",
"==",
"0",
"{",
"return",
"ErrSCTPAddrNoIP",
"\n",
"}",
"\n",
"return",
"pm",
".",
"Allocator",
".",
"ReleasePort",
"(",
"a",
".",
"IP",
"[",
"0",
"]",
",",
"\"",
"\"",
",",
"a",
".",
"Port",
")",
"\n",
"}",
"\n",
"return",
"ErrUnknownBackendAddressType",
"\n",
"}"
] | // Unmap removes stored mapping for the specified host transport address | [
"Unmap",
"removes",
"stored",
"mapping",
"for",
"the",
"specified",
"host",
"transport",
"address"
] | 9ff9b57c344df5cd47443ad9e65702ec85c5aeb0 | https://github.com/docker/libnetwork/blob/9ff9b57c344df5cd47443ad9e65702ec85c5aeb0/portmapper/mapper.go#L185-L219 | train |
Subsets and Splits