- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 28 for netns (0.04 sec)
-
cni/pkg/repair/netns.go
} func runInHost[T any](f func() (T, error)) (T, error) { var res T ns := getPidNamespace(1) err := netns.WithNetNSPath(ns, func(_ netns.NetNS) error { var err error res, err = f() return err }) if err != nil { return res, fmt.Errorf("in network namespace %v: %v", ns, err) } return res, nil } func checkInterfacesForMatchingAddr(targetAddr net.IP) (match bool, err error) {
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Fri Jun 28 19:12:54 UTC 2024 - 4.3K bytes - Viewed (0) -
cni/pkg/nodeagent/pod_cache_test.go
nspath1 := "/path/to/netns/1" nspath2 := "/path/to/netns/2" netns1, err := p.UpsertPodCache(pod, nspath1) if err != nil { t.Fatalf("unexpected error: %v", err) } netns2, err := p.UpsertPodCache(pod, nspath2) if err != nil { t.Fatalf("unexpected error: %v", err) } if !reflect.DeepEqual(netns1, netns2) { t.Fatalf("Expected the same Netns for the same uid, got %v and %v", netns1, netns2)
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Aug 14 19:36:19 UTC 2024 - 4.2K bytes - Viewed (0) -
cni/pkg/nodeagent/net.go
// in that case, try finding the netns using procfs. filter := map[types.UID]*corev1.Pod{ pod.UID: pod, } return s.scanProcForPodsAndCache(filter) } func (s *NetServer) getOrOpenNetns(pod *corev1.Pod, netNs string) (Netns, error) { if netNs == "" { return s.getNetns(pod) } return s.openNetns(pod, netNs) } func (s *NetServer) openNetns(pod *corev1.Pod, netNs string) (Netns, error) {
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Oct 21 16:48:55 UTC 2024 - 9.1K bytes - Viewed (0) -
cni/pkg/nodeagent/cni-watcher_test.go
valid := CNIPluginAddEvent{ Netns: "/var/netns/foo", PodName: "pod-bingo", PodNamespace: "funkyns", } payload, _ := json.Marshal(valid) addEvent, err := processAddEvent(payload) assert.NoError(t, err) assert.Equal(t, valid, addEvent) } func TestProcessAddEventBadPayload(t *testing.T) { valid := CNIPluginAddEvent{ Netns: "/var/netns/foo", PodName: "pod-bingo",
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Oct 09 16:05:45 UTC 2024 - 7.6K bytes - Viewed (0) -
cni/pkg/plugin/sidecar_iptables_linux.go
cfg.CaptureAllDNS = rdrct.dnsRedirect cfg.DropInvalid = rdrct.invalidDrop cfg.DualStack = rdrct.dualStack netNs, err := getNs(netns) if err != nil { err = fmt.Errorf("failed to open netns %q: %s", netns, err) return err } defer netNs.Close() return netNs.Do(func(_ ns.NetNS) error { // Important: run within the pod network namespace since some attributes are namespace specific
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Sat Jun 29 01:24:47 UTC 2024 - 2.6K bytes - Viewed (0) -
cni/pkg/nodeagent/cni-watcher.go
return msg, nil } func (s *CniPluginServer) ReconcileCNIAddEvent(ctx context.Context, addCmd CNIPluginAddEvent) error { log := log.WithLabels("cni-event", addCmd) log.Debugf("netns: %s", addCmd.Netns) // The CNI node plugin should have already checked the pod against the k8s API before forwarding us the event,
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Tue Jul 02 18:48:50 UTC 2024 - 6.7K bytes - Viewed (0) -
cni/pkg/nodeagent/pod_cache.go
if existing := p.currentPodCache[uid]; existing.Netns != nil { if existing.Netns.Inode() == workload.Netns.Inode() { workload.Netns.Close() // Replace the workload, but keep the old Netns p.currentPodCache[uid] = WorkloadInfo{ Workload: workload.Workload, Netns: existing.Netns, } // already in cache return existing.Netns } log.Debug("netns inode mismatch, using the new one") }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Fri May 31 17:18:11 UTC 2024 - 4.3K bytes - Viewed (0) -
cni/pkg/nodeagent/net_test.go
assert.Equal(t, nlDeps.DelLoopbackRoutesCnt.Load(), 1) // make sure the uid was taken from cache and netns closed netns := fixture.podNsMap.Take(string(pod.UID)) assert.Equal(t, nil, netns) // run gc to clean up ns: //revive:disable-next-line:call-to-gc Just a test that we are cleaning up the netns runtime.GC() assertNSClosed(t, closed) }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Thu Jul 25 16:13:38 UTC 2024 - 10.7K bytes - Viewed (0) -
cni/pkg/plugin/cnieventclient.go
for _, ipc := range prevResIps { ncconfigs = append(ncconfigs, nodeagent.IPConfig{Interface: ipc.Interface, Address: ipc.Address, Gateway: ipc.Gateway}) } // Currently we only use the netns from the original CNI event addEvent := nodeagent.CNIPluginAddEvent{Netns: event.Netns, PodName: podName, PodNamespace: podNamespace, IPs: ncconfigs} eventData, err := json.Marshal(addEvent) if err != nil { return err }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Tue Jul 02 18:48:50 UTC 2024 - 2.7K bytes - Viewed (0) -
cni/pkg/nodeagent/ztunnelserver.go
"number of connections to ztunnel") type ZtunnelServer interface { Run(ctx context.Context) PodDeleted(ctx context.Context, uid string) error PodAdded(ctx context.Context, pod *v1.Pod, netns Netns) error Close() error } /* To clean up stale ztunnels we may need to ztunnel to send its (uid, bootid / boot time) to us so that we can remove stale entries when the ztunnel pod is deleted
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Jul 29 16:08:35 UTC 2024 - 13.2K bytes - Viewed (0)