Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 68 for netbsd (0.05 sec)

  1. cni/pkg/nodeagent/podcgroupns.go

    		return nil, nil
    	}
    
    	netns, err := proc.Open(netnsName)
    	if err != nil {
    		return nil, err
    	}
    	fd, err := GetFd(netns)
    	if err != nil {
    		netns.Close()
    		return nil, err
    	}
    	netnsObserved[inode] = struct{}{}
    	log.Debugf("found pod to netns: %s %d", uid, inode)
    
    	return &PodNetnsEntry{
    		uid:     uid,
    		netns:   netns,
    		netnsfd: fd,
    		inode:   inode,
    	}, nil
    }
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Fri Apr 12 21:47:31 UTC 2024
    - 11K bytes
    - Viewed (0)
  2. cni/pkg/nodeagent/net_test.go

    	assert.Equal(t, nlDeps.DelLoopbackRoutesCnt.Load(), 1)
    	// make sure the uid was taken from cache and netns closed
    	netns := fixture.podNsMap.Take(string(pod.UID))
    	assert.Equal(t, nil, netns)
    
    	// run gc to clean up ns:
    
    	//revive:disable-next-line:call-to-gc Just a test that we are cleaning up the netns
    	runtime.GC()
    	assertNSClosed(t, closed)
    }
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Thu Jul 25 16:13:38 UTC 2024
    - 10.7K bytes
    - Viewed (0)
  3. api/go1.20.txt

    pkg runtime/cgo (linux-arm-cgo), type Incomplete struct #46731
    pkg runtime/cgo (netbsd-386-cgo), type Incomplete struct #46731
    pkg runtime/cgo (netbsd-amd64-cgo), type Incomplete struct #46731
    pkg runtime/cgo (netbsd-arm64-cgo), type Incomplete struct #46731
    pkg runtime/cgo (netbsd-arm-cgo), type Incomplete struct #46731
    pkg runtime/cgo (openbsd-386-cgo), type Incomplete struct #46731
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Fri Feb 17 21:23:32 UTC 2023
    - 602.6K bytes
    - Viewed (0)
  4. cni/pkg/nodeagent/cni-watcher.go

    	return msg, nil
    }
    
    func (s *CniPluginServer) ReconcileCNIAddEvent(ctx context.Context, addCmd CNIPluginAddEvent) error {
    	log := log.WithLabels("cni-event", addCmd)
    
    	log.Debugf("netns: %s", addCmd.Netns)
    
    	// The CNI node plugin should have already checked the pod against the k8s API before forwarding us the event,
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Tue Jul 02 18:48:50 UTC 2024
    - 6.7K bytes
    - Viewed (0)
  5. cni/pkg/nodeagent/pod_cache.go

    	if existing := p.currentPodCache[uid]; existing.Netns != nil {
    		if existing.Netns.Inode() == workload.Netns.Inode() {
    			workload.Netns.Close()
    			// Replace the workload, but keep the old Netns
    			p.currentPodCache[uid] = WorkloadInfo{
    				Workload: workload.Workload,
    				Netns:    existing.Netns,
    			}
    			// already in cache
    			return existing.Netns
    		}
    		log.Debug("netns inode mismatch, using the new one")
    	}
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Fri May 31 17:18:11 UTC 2024
    - 4.3K bytes
    - Viewed (0)
  6. cni/pkg/nodeagent/cni-watcher_test.go

    	valid := CNIPluginAddEvent{
    		Netns:        "/var/netns/foo",
    		PodName:      "pod-bingo",
    		PodNamespace: "funkyns",
    	}
    
    	payload, _ := json.Marshal(valid)
    
    	addEvent, err := processAddEvent(payload)
    
    	assert.NoError(t, err)
    	assert.Equal(t, valid, addEvent)
    }
    
    func TestProcessAddEventBadPayload(t *testing.T) {
    	valid := CNIPluginAddEvent{
    		Netns:        "/var/netns/foo",
    		PodName:      "pod-bingo",
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Wed Oct 09 16:05:45 UTC 2024
    - 7.6K bytes
    - Viewed (0)
  7. cni/pkg/plugin/sidecar_iptables_linux.go

    	cfg.CaptureAllDNS = rdrct.dnsRedirect
    	cfg.DropInvalid = rdrct.invalidDrop
    	cfg.DualStack = rdrct.dualStack
    
    	netNs, err := getNs(netns)
    	if err != nil {
    		err = fmt.Errorf("failed to open netns %q: %s", netns, err)
    		return err
    	}
    	defer netNs.Close()
    
    	return netNs.Do(func(_ ns.NetNS) error {
    		// Important: run within the pod network namespace since some attributes are namespace specific
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Sat Jun 29 01:24:47 UTC 2024
    - 2.6K bytes
    - Viewed (0)
  8. cni/pkg/plugin/cnieventclient.go

    	for _, ipc := range prevResIps {
    		ncconfigs = append(ncconfigs, nodeagent.IPConfig{Interface: ipc.Interface, Address: ipc.Address, Gateway: ipc.Gateway})
    	}
    	// Currently we only use the netns from the original CNI event
    	addEvent := nodeagent.CNIPluginAddEvent{Netns: event.Netns, PodName: podName, PodNamespace: podNamespace, IPs: ncconfigs}
    	eventData, err := json.Marshal(addEvent)
    	if err != nil {
    		return err
    	}
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Tue Jul 02 18:48:50 UTC 2024
    - 2.7K bytes
    - Viewed (0)
  9. cni/pkg/nodeagent/ztunnelserver.go

    	"number of connections to ztunnel")
    
    type ZtunnelServer interface {
    	Run(ctx context.Context)
    	PodDeleted(ctx context.Context, uid string) error
    	PodAdded(ctx context.Context, pod *v1.Pod, netns Netns) error
    	Close() error
    }
    
    /*
    To clean up stale ztunnels
    
    	we may need to ztunnel to send its (uid, bootid / boot time) to us
    	so that we can remove stale entries when the ztunnel pod is deleted
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Jul 29 16:08:35 UTC 2024
    - 13.2K bytes
    - Viewed (0)
  10. cni/pkg/plugin/sidecar_iptables_unspecified.go

    var ErrNotImplemented = errors.New("not implemented")
    
    // Program defines a method which programs iptables based on the parameters
    // provided in Redirect.
    func (ipt *iptables) Program(podName, netns string, rdrct *Redirect) error {
    	return ErrNotImplemented
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Fri Jan 26 20:34:28 UTC 2024
    - 1.1K bytes
    - Viewed (0)
Back to top