Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 318 for cidr2 (0.04 sec)

  1. pkg/registry/core/service/ipallocator/cidrallocator_test.go

    		t.Fatalf("expected allocator to be empty, got %d", r.Free())
    	}
    	cidr2 := newServiceCIDR("cidr2", "192.168.0.0/28")
    	_, err = r.client.ServiceCIDRs().Create(context.Background(), cidr2, metav1.CreateOptions{})
    	if err != nil {
    		t.Fatal(err)
    	}
    	r.addServiceCIDR(cidr2)
    	err = r.client.ServiceCIDRs().Delete(context.Background(), cidr.Name, metav1.DeleteOptions{})
    	if err != nil {
    		t.Fatal(err)
    	}
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Oct 31 21:05:06 UTC 2023
    - 13.7K bytes
    - Viewed (0)
  2. staging/src/k8s.io/apiserver/pkg/cel/library/cidr.go

    // cidr('192.168.0.1/24').ip().family() // returns '4'
    // cidr('::1/128').ip() // returns ipAddr('::1')
    // cidr('::1/128').ip().family() // returns '6'
    // cidr('192.168.0.0/24').masked() // returns cidr('192.168.0.0/24')
    // cidr('192.168.0.1/24').masked() // returns cidr('192.168.0.0/24')
    // cidr('192.168.0.0/24') == cidr('192.168.0.0/24').masked() // returns true, CIDR was already in canonical format
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Dec 15 12:03:04 UTC 2023
    - 8.9K bytes
    - Viewed (0)
  3. staging/src/k8s.io/apiserver/pkg/cel/cidr.go

    	"github.com/google/cel-go/common/types"
    	"github.com/google/cel-go/common/types/ref"
    )
    
    // CIDR provides a CEL representation of an network address.
    type CIDR struct {
    	netip.Prefix
    }
    
    var (
    	CIDRType = cel.OpaqueType("net.CIDR")
    )
    
    // ConvertToNative implements ref.Val.ConvertToNative.
    func (d CIDR) ConvertToNative(typeDesc reflect.Type) (any, error) {
    	if reflect.TypeOf(d.Prefix).AssignableTo(typeDesc) {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Dec 15 12:03:04 UTC 2023
    - 2.2K bytes
    - Viewed (0)
  4. pkg/controller/servicecidrs/servicecidrs_controller_test.go

    	tests := []struct {
    		name  string
    		cidrs []*networkingapiv1alpha1.ServiceCIDR
    		cidr  *networkingapiv1alpha1.ServiceCIDR
    		want  []string
    	}{
    		{
    			name: "empty",
    			cidr: makeServiceCIDR(defaultservicecidr.DefaultServiceCIDRName, "192.168.0.0/24", "2001:db2::/64"),
    			want: []string{},
    		}, {
    			name: "one CIDR",
    			cidrs: []*networkingapiv1alpha1.ServiceCIDR{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Feb 26 06:51:56 UTC 2024
    - 22K bytes
    - Viewed (0)
  5. pkg/controlplane/controller/defaultservicecidr/default_servicecidr_controller_test.go

    		{
    			name: "existing default service CIDR not matching cidrs",
    			cidrs: []*networkingapiv1alpha1.ServiceCIDR{
    				{
    					ObjectMeta: metav1.ObjectMeta{
    						Name: DefaultServiceCIDRName,
    					},
    					Spec: networkingapiv1alpha1.ServiceCIDRSpec{
    						CIDRs: []string{"fd00::/112"},
    					},
    				},
    			},
    		},
    		{
    			name: "existing default service CIDR not ready",
    			cidrs: []*networkingapiv1alpha1.ServiceCIDR{
    				{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Nov 14 23:31:58 UTC 2023
    - 4.8K bytes
    - Viewed (0)
  6. pkg/proxy/util/nodeport_addresses.go

    	for _, str := range npa.cidrStrings {
    		_, cidr, _ := netutils.ParseCIDRSloppy(str)
    
    		if netutils.IsIPv4CIDR(cidr) {
    			if cidr.IP.IsLoopback() || cidr.Contains(ipv4LoopbackStart) {
    				npa.containsIPv4Loopback = true
    			}
    		}
    
    		if IsZeroCIDR(str) {
    			// Ignore everything else
    			npa.cidrs = []*net.IPNet{cidr}
    			npa.matchAll = true
    			break
    		}
    
    		npa.cidrs = append(npa.cidrs, cidr)
    	}
    
    	return npa
    }
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Apr 18 13:25:06 UTC 2024
    - 3.6K bytes
    - Viewed (0)
  7. pkg/controller/nodeipam/ipam/controller_test.go

    		}
    		// Allocate until full.
    		var cidrs []*net.IPNet
    		for {
    			cidr, err := set.AllocateNext()
    			if err != nil {
    				if err == cidrset.ErrCIDRRangeNoCIDRsRemaining {
    					break
    				}
    				t.Errorf("set.AllocateNext() = %v, want %v", err, cidrset.ErrCIDRRangeNoCIDRsRemaining)
    				continue TestCase
    			}
    			cidrs = append(cidrs, cidr)
    		}
    		// No allocated CIDR range should intersect with serviceCIDR.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Jan 04 20:48:08 UTC 2018
    - 1.9K bytes
    - Viewed (0)
  8. pkg/controller/nodeipam/ipam/range_allocator.go

    			return fmt.Errorf("node:%s has an allocated cidr: %v at index:%v that does not exist in cluster cidrs configuration", node.Name, cidr, idx)
    		}
    
    		logger.V(4).Info("Release CIDR for node", "CIDR", cidr, "node", klog.KObj(node))
    		if err = r.cidrSets[idx].Release(podCIDR); err != nil {
    			return fmt.Errorf("error when releasing CIDR %v: %v", cidr, err)
    		}
    	}
    	return nil
    }
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 24 10:06:15 UTC 2024
    - 16.2K bytes
    - Viewed (1)
  9. pkg/api/service/util_test.go

    	}
    	cidrs = checkOK("192.168.0.1/32,192.168.0.2/32")
    	if len(cidrs) != 2 {
    		t.Errorf("Expected two CIDRs: %v", cidrs.StringSlice())
    	}
    	cidrs = checkOK("  192.168.0.1/32 , 192.168.0.2/32   ")
    	if len(cidrs) != 2 {
    		t.Errorf("Expected two CIDRs: %v", cidrs.StringSlice())
    	}
    	// check LoadBalancerSourceRanges not specified
    	svc := api.Service{}
    	cidrs, err := GetLoadBalancerSourceRanges(&svc)
    	if err != nil {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Sep 01 15:18:45 UTC 2023
    - 7.6K bytes
    - Viewed (0)
  10. cmd/cloud-controller-manager/nodeipamcontroller.go

    	// if cidrs has an error then the previous call will fail
    	// safe to ignore error checking on next call
    	dualstack, _ := netutils.IsDualStackCIDRs(cidrs)
    
    	return cidrs, dualstack, nil
    }
    
    // setNodeCIDRMaskSizes returns the IPv4 and IPv6 node cidr mask sizes to the value provided
    // for --node-cidr-mask-size-ipv4 and --node-cidr-mask-size-ipv6 respectively. If value not provided,
    // then it will return default IPv4 and IPv6 cidr mask sizes.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Oct 14 19:06:22 UTC 2023
    - 8.9K bytes
    - Viewed (0)
Back to top