- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 29 for ParsePrefix (0.23 sec)
-
operator/pkg/validate/validate_values_test.go
wantErrs: makeErrors([]string{ `global.proxy.excludeIPRanges netip.ParsePrefix("3.3.0.0/33"): prefix length out of range`, `global.proxy.excludeIPRanges netip.ParsePrefix("4.4.0.0/34"): prefix length out of range`, `global.proxy.includeIPRanges netip.ParsePrefix("1.1.0.256/16"): ParseAddr("1.1.0.256"): IPv4 field has value >255`, `global.proxy.includeIPRanges netip.ParsePrefix("2.2.0.257/16"): ParseAddr("2.2.0.257"): IPv4 field has value >255`, }),
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri May 31 13:43:12 UTC 2024 - 6K bytes - Viewed (0) -
operator/pkg/validate/validate_test.go
}, { desc: "BadValuesIP with Space end", yamlStr: ` values: global: proxy: includeIPRanges: "1.1.0.0/16 ,2.2.0.0/16" `, wantErrs: makeErrors([]string{`global.proxy.includeIPRanges netip.ParsePrefix("1.1.0.0/16 "): bad bits after slash: "16 "`}), }, }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Jun 25 11:44:31 UTC 2023 - 4.6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/cel/library/cidr_test.go
} else { t.Fatal("expected result must not be nil") } } func TestCIDR(t *testing.T) { ipv4CIDR, _ := netip.ParsePrefix("192.168.0.0/24") ipv4Addr, _ := netip.ParseAddr("192.168.0.0") ipv6CIDR, _ := netip.ParsePrefix("2001:db8::/32") ipv6Addr, _ := netip.ParseAddr("2001:db8::") trueVal := types.Bool(true) falseVal := types.Bool(false) cases := []struct {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Dec 15 12:03:09 UTC 2023 - 8.3K bytes - Viewed (0) -
tools/istio-iptables/pkg/config/validation.go
"should be redirected to Envoy cannot exceed %d, got %d: %v", maxOwnerGroupsInclude, len(filter.Values), filter.Values) } return nil } func ValidateIPv4LoopbackCidr(cidr string) error { ipp, err := netip.ParsePrefix(cidr) if err != nil { return fmt.Errorf("failed to parse CIDR %s: %v", cidr, err) } if !ipp.Addr().Is4() || !ipp.Addr().IsLoopback() {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jan 11 02:38:28 UTC 2024 - 2K bytes - Viewed (0) -
src/net/netip/fuzz_test.go
port = AddrPortFrom(ip, 80) checkStringParseRoundTrip(t, port, ParseAddrPort) checkEncoding(t, port) ipp, err := ParsePrefix(s) if err == nil { checkStringParseRoundTrip(t, ipp, ParsePrefix) checkEncoding(t, ipp) } ipp = PrefixFrom(ip, 8) checkStringParseRoundTrip(t, ipp, ParsePrefix) checkEncoding(t, ipp) }) }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Dec 20 23:46:23 UTC 2021 - 10.5K bytes - Viewed (0) -
security/pkg/server/ca/authenticate/xfcc_authenticator.go
return true } } // Always trust local host addresses. return netip.MustParseAddr(ip).IsLoopback() } func isInRange(addr, cidr string) bool { if strings.Contains(cidr, "/") { ipp, err := netip.ParsePrefix(cidr) if err != nil { return false } return ipp.Contains(netip.MustParseAddr(addr)) } return false
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Apr 08 17:05:56 UTC 2024 - 3K bytes - Viewed (0) -
pkg/registry/core/service/ipallocator/cidrallocator.go
} allocator.ready.Store(cidrReady[cidr]) prefix, err := netip.ParsePrefix(cidr) if err != nil { return err } c.addAllocator(prefix, allocator) klog.Infof("Created ClusterIP allocator for Service CIDR %s", cidr) } // Remove allocators that no longer exist for _, cidr := range cidrsToRemove.UnsortedList() { prefix, err := netip.ParsePrefix(cidr) if err != nil { return err }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 04 18:33:12 UTC 2024 - 13.2K bytes - Viewed (0) -
pkg/controller/servicecidrs/servicecidrs_controller.go
c.muTree.Lock() defer c.muTree.Unlock() serviceCIDRs := sets.New[string]() for _, cidr := range serviceCIDR.Spec.CIDRs { if prefix, err := netip.ParsePrefix(cidr); err == nil { // if is empty err will not be nil c.tree.WalkPath(prefix, func(k netip.Prefix, v sets.Set[string]) bool { serviceCIDRs.Insert(v.UnsortedList()...) return false })
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 04 18:33:12 UTC 2024 - 18K bytes - Viewed (0) -
pkg/api/service/warnings_test.go
`spec.loadBalancerSourceRanges[1]: IP prefix was accepted, but will be invalid in a future Kubernetes release: netip.ParsePrefix("10.012.2.0/24"): ParseAddr("10.012.2.0"): IPv4 field has octet with leading zero`, }, }, } for _, tt := range tests { t.Run(tt.name, func(t *testing.T) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jul 26 22:57:57 UTC 2023 - 10.4K bytes - Viewed (0) -
pkg/api/service/warnings.go
// IPv4 addresses with leading zeros CVE-2021-29923 are not valid in golang since 1.17 // This will also warn about possible future changes on the golang std library // xref: https://issues.k8s.io/108074 prefix, err := netip.ParsePrefix(cidr) if err != nil { return []string{fmt.Sprintf("%s: IP prefix was accepted, but will be invalid in a future Kubernetes release: %v", fieldPath, err)} } // A Recommendation for IPv6 Address Text Representation //
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jul 26 22:57:57 UTC 2023 - 4.2K bytes - Viewed (0)