- Sort Score
- Result 10 results
- Languages All
Results 1 - 7 of 7 for cidrSet (0.25 sec)
-
pkg/controller/nodeipam/ipam/range_allocator.go
// create a cidrSet for each cidr we operate on // cidrSet are mapped to clusterCIDR by index cidrSets := make([]*cidrset.CidrSet, len(allocatorParams.ClusterCIDRs)) for idx, cidr := range allocatorParams.ClusterCIDRs { cidrSet, err := cidrset.NewCIDRSet(cidr, allocatorParams.NodeCIDRMaskSizes[idx]) if err != nil { return nil, err } cidrSets[idx] = cidrSet } ra := &rangeAllocator{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 24 10:06:15 UTC 2024 - 16.2K bytes - Viewed (0) -
pkg/controller/nodeipam/ipam/cidr_allocator.go
outCIDRs[idx] = inCIDR.String() } return outCIDRs } // occupyServiceCIDR removes the service CIDR range from the cluster CIDR if it // intersects. func occupyServiceCIDR(set *cidrset.CidrSet, clusterCIDR, serviceCIDR *net.IPNet) error { if clusterCIDR.Contains(serviceCIDR.IP) || serviceCIDR.Contains(clusterCIDR.IP) { if err := set.Occupy(serviceCIDR); err != nil { return err } } return nil
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 13:03:57 UTC 2024 - 5.3K bytes - Viewed (0) -
cmd/cloud-controller-manager/.import-restrictions
- k8s.io/kubernetes/pkg/controller/nodeipam - k8s.io/kubernetes/pkg/controller/nodeipam/config - k8s.io/kubernetes/pkg/controller/nodeipam/ipam - k8s.io/kubernetes/pkg/controller/nodeipam/ipam/cidrset - k8s.io/kubernetes/pkg/controller/nodeipam/ipam/sync - k8s.io/kubernetes/pkg/controller/nodeipam/ipam/test - k8s.io/kubernetes/pkg/controller/testutil - k8s.io/kubernetes/pkg/controller/util/node
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Aug 30 15:56:47 UTC 2023 - 2.1K bytes - Viewed (0) -
pilot/pkg/networking/core/listener.go
continue } if s == "*" { continue } res.Insert(prefix.Masked().String()) } return res } return cidrSet(a.destinationCIDRs).Equals(cidrSet(b.destinationCIDRs)) } func (chain *filterChainOpts) toFilterChainMatch() *listener.FilterChainMatch { if chain.isMatchAll() { return nil } match := &listener.FilterChainMatch{
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 06 04:44:06 UTC 2024 - 55.1K bytes - Viewed (0) -
pkg/registry/core/service/ipallocator/cidrallocator.go
treeSet.Insert(k.String()) return false }) c.muTree.Unlock() cidrsToRemove := treeSet.Difference(cidrsSet) cidrsToAdd := cidrsSet.Difference(treeSet) errs := []error{} // Add new allocators for _, cidr := range cidrsToAdd.UnsortedList() { _, ipnet, err := netutils.ParseCIDRSloppy(cidr) if err != nil { return err } // New ServiceCIDR, create new allocator
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 04 18:33:12 UTC 2024 - 13.2K bytes - Viewed (0) -
pkg/controller/nodeipam/ipam/range_allocator_test.go
_, cidr, err := netutils.ParseCIDRSloppy(allocated) if err != nil { t.Fatalf("%v: unexpected error when parsing CIDR %v: %v", tc.description, allocated, err) } if err = rangeAllocator.cidrSets[idx].Occupy(cidr); err != nil { t.Fatalf("%v: unexpected error when occupying CIDR %v: %v", tc.description, allocated, err) } } } updateCount := 0
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 24 10:06:15 UTC 2024 - 25.2K bytes - Viewed (0) -
pkg/kubelet/pleg/generic.go
} func getContainersFromPods(pods ...*kubecontainer.Pod) []*kubecontainer.Container { cidSet := sets.New[string]() var containers []*kubecontainer.Container fillCidSet := func(cs []*kubecontainer.Container) { for _, c := range cs { cid := c.ID.ID if cidSet.Has(cid) { continue } cidSet.Insert(cid) containers = append(containers, c) } } for _, p := range pods {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jun 04 06:25:43 UTC 2024 - 19.3K bytes - Viewed (0)