Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 8 of 8 for parseCIDR (4.17 sec)

  1. cni/pkg/nodeagent/cni-watcher_test.go

    	invalid := string(payload) + "funkyjunk"
    
    	_, err := processAddEvent([]byte(invalid))
    
    	assert.Error(t, err)
    }
    
    func TestCNIPluginServer(t *testing.T) {
    	fakePodIP := "11.1.1.12"
    	_, addr, _ := net.ParseCIDR(fakePodIP + "/32")
    	valid := CNIPluginAddEvent{
    		Netns:        "/var/netns/foo",
    		PodName:      "pod-bingo",
    		PodNamespace: "funkyns",
    		IPs: []IPConfig{{
    			Address: *addr,
    		}},
    	}
    
    	setupLogging()
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 06 21:31:35 UTC 2024
    - 7.6K bytes
    - Viewed (0)
  2. src/net/ip.go

    		return [16]byte{}, false
    	}
    	return ip.As16(), true
    }
    
    // ParseCIDR parses s as a CIDR notation IP address and prefix length,
    // like "192.0.2.0/24" or "2001:db8::/32", as defined in
    // RFC 4632 and RFC 4291.
    //
    // It returns the IP address and the network implied by the IP and
    // prefix length.
    // For example, ParseCIDR("192.0.2.1/24") returns the IP address
    // 192.0.2.1 and the network 192.0.2.0/24.
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Sat May 18 03:13:26 UTC 2024
    - 13.9K bytes
    - Viewed (0)
  3. pilot/pkg/serviceregistry/kube/controller/network.go

    		// track endpoints items from this registry are a part of this network
    		fromRegistry := false
    		for _, ep := range v.Endpoints {
    			if ep.GetFromCidr() != "" {
    				_, nw, err := net.ParseCIDR(ep.GetFromCidr())
    				if err != nil {
    					log.Warnf("unable to parse CIDR %q for network %s", ep.GetFromCidr(), id)
    					continue
    				}
    				rangerEntry := namedRangerEntry{
    					name:    network.ID(id),
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri May 31 22:23:22 UTC 2024
    - 15.4K bytes
    - Viewed (0)
  4. pilot/pkg/simulation/traffic.go

    		ranger := cidranger.NewPCTrieRanger()
    		for _, a := range fc.GetPrefixRanges() {
    			s := fmt.Sprintf("%s/%d", a.AddressPrefix, a.GetPrefixLen().GetValue())
    			_, cidr, err := net.ParseCIDR(s)
    			if err != nil {
    				sim.t.Fatalf("failed to parse cidr %v: %v", s, err)
    			}
    			if err := ranger.Insert(cidranger.NewBasicRangerEntry(*cidr)); err != nil {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 01:56:28 UTC 2024
    - 19.4K bytes
    - Viewed (0)
  5. src/crypto/x509/x509_test.go

    			PermittedDNSDomains:     []string{".example.com", "example.com"},
    			ExcludedDNSDomains:      []string{"bar.example.com"},
    			PermittedIPRanges:       []*net.IPNet{parseCIDR("192.168.1.1/16"), parseCIDR("1.2.3.4/8")},
    			ExcludedIPRanges:        []*net.IPNet{parseCIDR("2001:db8::/48")},
    			PermittedEmailAddresses: []string{"******@****.***"},
    			ExcludedEmailAddresses:  []string{".example.com", "example.com"},
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:00:16 UTC 2024
    - 163.4K bytes
    - Viewed (0)
  6. pilot/pkg/serviceregistry/serviceentry/controller_test.go

    		if ip == nil {
    			t.Errorf("invalid IP address %s : %s", svc.AutoAllocatedIPv4Address, svc.Hostname.String())
    		}
    		// Validate that IP address is in the expected range.
    		_, subnet, _ := net.ParseCIDR("240.240.0.0/16")
    		if !subnet.Contains(ip) {
    			t.Errorf("IP address not in range %s : %s", svc.AutoAllocatedIPv4Address, svc.Hostname.String())
    		}
    	}
    	assert.Equal(t, maxIPs, len(gotIPMap))
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed May 29 15:31:09 UTC 2024
    - 92.9K bytes
    - Viewed (0)
  7. pkg/generated/openapi/zz_generated.openapi.go

    hostname: a valid representation for an Internet host name, as defined by RFC 1034, section 3.1 [RFC1034]. - ipv4: an IPv4 IP as parsed by Golang net.ParseIP - ipv6: an IPv6 IP as parsed by Golang net.ParseIP - cidr: a CIDR as parsed by Golang net.ParseCIDR - mac: a MAC address as parsed by Golang net.ParseMAC - uuid: an UUID that allows uppercase defined by the regex (?i)^[0-9a-f]{8}-?[0-9a-f]{4}-?[0-9a-f]{4}-?[0-9a-f]{4}-?[0-9a-f]{12}$ - uuid3: an UUID3 that allows uppercase defined by the regex ...
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jun 05 18:37:07 UTC 2024
    - 3M bytes
    - Viewed (0)
  8. api/openapi-spec/swagger.json

    hostname: a valid representation for an Internet host name, as defined by RFC 1034, section 3.1 [RFC1034]. - ipv4: an IPv4 IP as parsed by Golang net.ParseIP - ipv6: an IPv6 IP as parsed by Golang net.ParseIP - cidr: a CIDR as parsed by Golang net.ParseCIDR - mac: a MAC address as parsed by Golang net.ParseMAC - uuid: an UUID that allows uppercase defined by the regex (?i)^[0-9a-f]{8}-?[0-9a-f]{4}-?[0-9a-f]{4}-?[0-9a-f]{4}-?[0-9a-f]{12}$ - uuid3: an UUID3 that allows uppercase defined by the regex ...
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jun 05 18:37:07 UTC 2024
    - 3.1M bytes
    - Viewed (0)
Back to top