Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 6 of 6 for cidrSet (0.43 sec)

  1. pkg/controller/nodeipam/ipam/range_allocator.go

    	// create a cidrSet for each cidr we operate on
    	// cidrSet are mapped to clusterCIDR by index
    	cidrSets := make([]*cidrset.CidrSet, len(allocatorParams.ClusterCIDRs))
    	for idx, cidr := range allocatorParams.ClusterCIDRs {
    		cidrSet, err := cidrset.NewCIDRSet(cidr, allocatorParams.NodeCIDRMaskSizes[idx])
    		if err != nil {
    			return nil, err
    		}
    		cidrSets[idx] = cidrSet
    	}
    
    	ra := &rangeAllocator{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 24 10:06:15 UTC 2024
    - 16.2K bytes
    - Viewed (0)
  2. pkg/controller/nodeipam/ipam/cidr_allocator.go

    		outCIDRs[idx] = inCIDR.String()
    	}
    	return outCIDRs
    }
    
    // occupyServiceCIDR removes the service CIDR range from the cluster CIDR if it
    // intersects.
    func occupyServiceCIDR(set *cidrset.CidrSet, clusterCIDR, serviceCIDR *net.IPNet) error {
    	if clusterCIDR.Contains(serviceCIDR.IP) || serviceCIDR.Contains(clusterCIDR.IP) {
    		if err := set.Occupy(serviceCIDR); err != nil {
    			return err
    		}
    	}
    	return nil
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 01 13:03:57 UTC 2024
    - 5.3K bytes
    - Viewed (0)
  3. pilot/pkg/networking/core/listener.go

    				continue
    			}
    
    			if s == "*" {
    				continue
    			}
    			res.Insert(prefix.Masked().String())
    		}
    		return res
    	}
    	return cidrSet(a.destinationCIDRs).Equals(cidrSet(b.destinationCIDRs))
    }
    
    func (chain *filterChainOpts) toFilterChainMatch() *listener.FilterChainMatch {
    	if chain.isMatchAll() {
    		return nil
    	}
    	match := &listener.FilterChainMatch{
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon May 06 04:44:06 UTC 2024
    - 55.1K bytes
    - Viewed (0)
  4. pkg/registry/core/service/ipallocator/cidrallocator.go

    		treeSet.Insert(k.String())
    		return false
    	})
    	c.muTree.Unlock()
    	cidrsToRemove := treeSet.Difference(cidrsSet)
    	cidrsToAdd := cidrsSet.Difference(treeSet)
    
    	errs := []error{}
    	// Add new allocators
    	for _, cidr := range cidrsToAdd.UnsortedList() {
    		_, ipnet, err := netutils.ParseCIDRSloppy(cidr)
    		if err != nil {
    			return err
    		}
    		// New ServiceCIDR, create new allocator
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat May 04 18:33:12 UTC 2024
    - 13.2K bytes
    - Viewed (0)
  5. pkg/controller/nodeipam/ipam/range_allocator_test.go

    				_, cidr, err := netutils.ParseCIDRSloppy(allocated)
    				if err != nil {
    					t.Fatalf("%v: unexpected error when parsing CIDR %v: %v", tc.description, allocated, err)
    				}
    				if err = rangeAllocator.cidrSets[idx].Occupy(cidr); err != nil {
    					t.Fatalf("%v: unexpected error when occupying CIDR %v: %v", tc.description, allocated, err)
    				}
    			}
    		}
    
    		updateCount := 0
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 24 10:06:15 UTC 2024
    - 25.2K bytes
    - Viewed (0)
  6. pkg/kubelet/pleg/generic.go

    }
    
    func getContainersFromPods(pods ...*kubecontainer.Pod) []*kubecontainer.Container {
    	cidSet := sets.New[string]()
    	var containers []*kubecontainer.Container
    	fillCidSet := func(cs []*kubecontainer.Container) {
    		for _, c := range cs {
    			cid := c.ID.ID
    			if cidSet.Has(cid) {
    				continue
    			}
    			cidSet.Insert(cid)
    			containers = append(containers, c)
    		}
    	}
    
    	for _, p := range pods {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Jun 04 06:25:43 UTC 2024
    - 19.3K bytes
    - Viewed (0)
Back to top