- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 318 for cidr2 (0.04 sec)
-
pkg/registry/core/service/ipallocator/cidrallocator_test.go
t.Fatalf("expected allocator to be empty, got %d", r.Free()) } cidr2 := newServiceCIDR("cidr2", "192.168.0.0/28") _, err = r.client.ServiceCIDRs().Create(context.Background(), cidr2, metav1.CreateOptions{}) if err != nil { t.Fatal(err) } r.addServiceCIDR(cidr2) err = r.client.ServiceCIDRs().Delete(context.Background(), cidr.Name, metav1.DeleteOptions{}) if err != nil { t.Fatal(err) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Oct 31 21:05:06 UTC 2023 - 13.7K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/cel/library/cidr.go
// cidr('192.168.0.1/24').ip().family() // returns '4' // cidr('::1/128').ip() // returns ipAddr('::1') // cidr('::1/128').ip().family() // returns '6' // cidr('192.168.0.0/24').masked() // returns cidr('192.168.0.0/24') // cidr('192.168.0.1/24').masked() // returns cidr('192.168.0.0/24') // cidr('192.168.0.0/24') == cidr('192.168.0.0/24').masked() // returns true, CIDR was already in canonical format
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Dec 15 12:03:04 UTC 2023 - 8.9K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/cel/cidr.go
"github.com/google/cel-go/common/types" "github.com/google/cel-go/common/types/ref" ) // CIDR provides a CEL representation of an network address. type CIDR struct { netip.Prefix } var ( CIDRType = cel.OpaqueType("net.CIDR") ) // ConvertToNative implements ref.Val.ConvertToNative. func (d CIDR) ConvertToNative(typeDesc reflect.Type) (any, error) { if reflect.TypeOf(d.Prefix).AssignableTo(typeDesc) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Dec 15 12:03:04 UTC 2023 - 2.2K bytes - Viewed (0) -
pkg/controller/servicecidrs/servicecidrs_controller_test.go
tests := []struct { name string cidrs []*networkingapiv1alpha1.ServiceCIDR cidr *networkingapiv1alpha1.ServiceCIDR want []string }{ { name: "empty", cidr: makeServiceCIDR(defaultservicecidr.DefaultServiceCIDRName, "192.168.0.0/24", "2001:db2::/64"), want: []string{}, }, { name: "one CIDR", cidrs: []*networkingapiv1alpha1.ServiceCIDR{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Feb 26 06:51:56 UTC 2024 - 22K bytes - Viewed (0) -
pkg/controlplane/controller/defaultservicecidr/default_servicecidr_controller_test.go
{ name: "existing default service CIDR not matching cidrs", cidrs: []*networkingapiv1alpha1.ServiceCIDR{ { ObjectMeta: metav1.ObjectMeta{ Name: DefaultServiceCIDRName, }, Spec: networkingapiv1alpha1.ServiceCIDRSpec{ CIDRs: []string{"fd00::/112"}, }, }, }, }, { name: "existing default service CIDR not ready", cidrs: []*networkingapiv1alpha1.ServiceCIDR{ {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Nov 14 23:31:58 UTC 2023 - 4.8K bytes - Viewed (0) -
pkg/proxy/util/nodeport_addresses.go
for _, str := range npa.cidrStrings { _, cidr, _ := netutils.ParseCIDRSloppy(str) if netutils.IsIPv4CIDR(cidr) { if cidr.IP.IsLoopback() || cidr.Contains(ipv4LoopbackStart) { npa.containsIPv4Loopback = true } } if IsZeroCIDR(str) { // Ignore everything else npa.cidrs = []*net.IPNet{cidr} npa.matchAll = true break } npa.cidrs = append(npa.cidrs, cidr) } return npa }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 18 13:25:06 UTC 2024 - 3.6K bytes - Viewed (0) -
pkg/controller/nodeipam/ipam/controller_test.go
} // Allocate until full. var cidrs []*net.IPNet for { cidr, err := set.AllocateNext() if err != nil { if err == cidrset.ErrCIDRRangeNoCIDRsRemaining { break } t.Errorf("set.AllocateNext() = %v, want %v", err, cidrset.ErrCIDRRangeNoCIDRsRemaining) continue TestCase } cidrs = append(cidrs, cidr) } // No allocated CIDR range should intersect with serviceCIDR.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Jan 04 20:48:08 UTC 2018 - 1.9K bytes - Viewed (0) -
pkg/controller/nodeipam/ipam/range_allocator.go
return fmt.Errorf("node:%s has an allocated cidr: %v at index:%v that does not exist in cluster cidrs configuration", node.Name, cidr, idx) } logger.V(4).Info("Release CIDR for node", "CIDR", cidr, "node", klog.KObj(node)) if err = r.cidrSets[idx].Release(podCIDR); err != nil { return fmt.Errorf("error when releasing CIDR %v: %v", cidr, err) } } return nil }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 24 10:06:15 UTC 2024 - 16.2K bytes - Viewed (1) -
pkg/api/service/util_test.go
} cidrs = checkOK("192.168.0.1/32,192.168.0.2/32") if len(cidrs) != 2 { t.Errorf("Expected two CIDRs: %v", cidrs.StringSlice()) } cidrs = checkOK(" 192.168.0.1/32 , 192.168.0.2/32 ") if len(cidrs) != 2 { t.Errorf("Expected two CIDRs: %v", cidrs.StringSlice()) } // check LoadBalancerSourceRanges not specified svc := api.Service{} cidrs, err := GetLoadBalancerSourceRanges(&svc) if err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Sep 01 15:18:45 UTC 2023 - 7.6K bytes - Viewed (0) -
cmd/cloud-controller-manager/nodeipamcontroller.go
// if cidrs has an error then the previous call will fail // safe to ignore error checking on next call dualstack, _ := netutils.IsDualStackCIDRs(cidrs) return cidrs, dualstack, nil } // setNodeCIDRMaskSizes returns the IPv4 and IPv6 node cidr mask sizes to the value provided // for --node-cidr-mask-size-ipv4 and --node-cidr-mask-size-ipv6 respectively. If value not provided, // then it will return default IPv4 and IPv6 cidr mask sizes.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Oct 14 19:06:22 UTC 2023 - 8.9K bytes - Viewed (0)