id
int32 0
167k
| repo
stringlengths 5
54
| path
stringlengths 4
155
| func_name
stringlengths 1
118
| original_string
stringlengths 52
85.5k
| language
stringclasses 1
value | code
stringlengths 52
85.5k
| code_tokens
sequencelengths 21
1.41k
| docstring
stringlengths 6
2.61k
| docstring_tokens
sequencelengths 3
215
| sha
stringlengths 40
40
| url
stringlengths 85
252
|
---|---|---|---|---|---|---|---|---|---|---|---|
6,800 | aporeto-inc/trireme-lib | controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go | NewRPCClient | func (mr *MockRPCClientMockRecorder) NewRPCClient(contextID, channel, rpcSecret interface{}) *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "NewRPCClient", reflect.TypeOf((*MockRPCClient)(nil).NewRPCClient), contextID, channel, rpcSecret)
} | go | func (mr *MockRPCClientMockRecorder) NewRPCClient(contextID, channel, rpcSecret interface{}) *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "NewRPCClient", reflect.TypeOf((*MockRPCClient)(nil).NewRPCClient), contextID, channel, rpcSecret)
} | [
"func",
"(",
"mr",
"*",
"MockRPCClientMockRecorder",
")",
"NewRPCClient",
"(",
"contextID",
",",
"channel",
",",
"rpcSecret",
"interface",
"{",
"}",
")",
"*",
"gomock",
".",
"Call",
"{",
"return",
"mr",
".",
"mock",
".",
"ctrl",
".",
"RecordCallWithMethodType",
"(",
"mr",
".",
"mock",
",",
"\"",
"\"",
",",
"reflect",
".",
"TypeOf",
"(",
"(",
"*",
"MockRPCClient",
")",
"(",
"nil",
")",
".",
"NewRPCClient",
")",
",",
"contextID",
",",
"channel",
",",
"rpcSecret",
")",
"\n",
"}"
] | // NewRPCClient indicates an expected call of NewRPCClient
// nolint | [
"NewRPCClient",
"indicates",
"an",
"expected",
"call",
"of",
"NewRPCClient",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go#L52-L54 |
6,801 | aporeto-inc/trireme-lib | controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go | GetRPCClient | func (m *MockRPCClient) GetRPCClient(contextID string) (*rpcwrapper.RPCHdl, error) {
ret := m.ctrl.Call(m, "GetRPCClient", contextID)
ret0, _ := ret[0].(*rpcwrapper.RPCHdl)
ret1, _ := ret[1].(error)
return ret0, ret1
} | go | func (m *MockRPCClient) GetRPCClient(contextID string) (*rpcwrapper.RPCHdl, error) {
ret := m.ctrl.Call(m, "GetRPCClient", contextID)
ret0, _ := ret[0].(*rpcwrapper.RPCHdl)
ret1, _ := ret[1].(error)
return ret0, ret1
} | [
"func",
"(",
"m",
"*",
"MockRPCClient",
")",
"GetRPCClient",
"(",
"contextID",
"string",
")",
"(",
"*",
"rpcwrapper",
".",
"RPCHdl",
",",
"error",
")",
"{",
"ret",
":=",
"m",
".",
"ctrl",
".",
"Call",
"(",
"m",
",",
"\"",
"\"",
",",
"contextID",
")",
"\n",
"ret0",
",",
"_",
":=",
"ret",
"[",
"0",
"]",
".",
"(",
"*",
"rpcwrapper",
".",
"RPCHdl",
")",
"\n",
"ret1",
",",
"_",
":=",
"ret",
"[",
"1",
"]",
".",
"(",
"error",
")",
"\n",
"return",
"ret0",
",",
"ret1",
"\n",
"}"
] | // GetRPCClient mocks base method
// nolint | [
"GetRPCClient",
"mocks",
"base",
"method",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go#L58-L63 |
6,802 | aporeto-inc/trireme-lib | controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go | RemoteCall | func (m *MockRPCClient) RemoteCall(contextID, methodName string, req *rpcwrapper.Request, resp *rpcwrapper.Response) error {
ret := m.ctrl.Call(m, "RemoteCall", contextID, methodName, req, resp)
ret0, _ := ret[0].(error)
return ret0
} | go | func (m *MockRPCClient) RemoteCall(contextID, methodName string, req *rpcwrapper.Request, resp *rpcwrapper.Response) error {
ret := m.ctrl.Call(m, "RemoteCall", contextID, methodName, req, resp)
ret0, _ := ret[0].(error)
return ret0
} | [
"func",
"(",
"m",
"*",
"MockRPCClient",
")",
"RemoteCall",
"(",
"contextID",
",",
"methodName",
"string",
",",
"req",
"*",
"rpcwrapper",
".",
"Request",
",",
"resp",
"*",
"rpcwrapper",
".",
"Response",
")",
"error",
"{",
"ret",
":=",
"m",
".",
"ctrl",
".",
"Call",
"(",
"m",
",",
"\"",
"\"",
",",
"contextID",
",",
"methodName",
",",
"req",
",",
"resp",
")",
"\n",
"ret0",
",",
"_",
":=",
"ret",
"[",
"0",
"]",
".",
"(",
"error",
")",
"\n",
"return",
"ret0",
"\n",
"}"
] | // RemoteCall mocks base method
// nolint | [
"RemoteCall",
"mocks",
"base",
"method",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go#L73-L77 |
6,803 | aporeto-inc/trireme-lib | controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go | RemoteCall | func (mr *MockRPCClientMockRecorder) RemoteCall(contextID, methodName, req, resp interface{}) *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RemoteCall", reflect.TypeOf((*MockRPCClient)(nil).RemoteCall), contextID, methodName, req, resp)
} | go | func (mr *MockRPCClientMockRecorder) RemoteCall(contextID, methodName, req, resp interface{}) *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "RemoteCall", reflect.TypeOf((*MockRPCClient)(nil).RemoteCall), contextID, methodName, req, resp)
} | [
"func",
"(",
"mr",
"*",
"MockRPCClientMockRecorder",
")",
"RemoteCall",
"(",
"contextID",
",",
"methodName",
",",
"req",
",",
"resp",
"interface",
"{",
"}",
")",
"*",
"gomock",
".",
"Call",
"{",
"return",
"mr",
".",
"mock",
".",
"ctrl",
".",
"RecordCallWithMethodType",
"(",
"mr",
".",
"mock",
",",
"\"",
"\"",
",",
"reflect",
".",
"TypeOf",
"(",
"(",
"*",
"MockRPCClient",
")",
"(",
"nil",
")",
".",
"RemoteCall",
")",
",",
"contextID",
",",
"methodName",
",",
"req",
",",
"resp",
")",
"\n",
"}"
] | // RemoteCall indicates an expected call of RemoteCall
// nolint | [
"RemoteCall",
"indicates",
"an",
"expected",
"call",
"of",
"RemoteCall",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go#L81-L83 |
6,804 | aporeto-inc/trireme-lib | controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go | DestroyRPCClient | func (m *MockRPCClient) DestroyRPCClient(contextID string) {
m.ctrl.Call(m, "DestroyRPCClient", contextID)
} | go | func (m *MockRPCClient) DestroyRPCClient(contextID string) {
m.ctrl.Call(m, "DestroyRPCClient", contextID)
} | [
"func",
"(",
"m",
"*",
"MockRPCClient",
")",
"DestroyRPCClient",
"(",
"contextID",
"string",
")",
"{",
"m",
".",
"ctrl",
".",
"Call",
"(",
"m",
",",
"\"",
"\"",
",",
"contextID",
")",
"\n",
"}"
] | // DestroyRPCClient mocks base method
// nolint | [
"DestroyRPCClient",
"mocks",
"base",
"method",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go#L87-L89 |
6,805 | aporeto-inc/trireme-lib | controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go | DestroyRPCClient | func (mr *MockRPCClientMockRecorder) DestroyRPCClient(contextID interface{}) *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DestroyRPCClient", reflect.TypeOf((*MockRPCClient)(nil).DestroyRPCClient), contextID)
} | go | func (mr *MockRPCClientMockRecorder) DestroyRPCClient(contextID interface{}) *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DestroyRPCClient", reflect.TypeOf((*MockRPCClient)(nil).DestroyRPCClient), contextID)
} | [
"func",
"(",
"mr",
"*",
"MockRPCClientMockRecorder",
")",
"DestroyRPCClient",
"(",
"contextID",
"interface",
"{",
"}",
")",
"*",
"gomock",
".",
"Call",
"{",
"return",
"mr",
".",
"mock",
".",
"ctrl",
".",
"RecordCallWithMethodType",
"(",
"mr",
".",
"mock",
",",
"\"",
"\"",
",",
"reflect",
".",
"TypeOf",
"(",
"(",
"*",
"MockRPCClient",
")",
"(",
"nil",
")",
".",
"DestroyRPCClient",
")",
",",
"contextID",
")",
"\n",
"}"
] | // DestroyRPCClient indicates an expected call of DestroyRPCClient
// nolint | [
"DestroyRPCClient",
"indicates",
"an",
"expected",
"call",
"of",
"DestroyRPCClient",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go#L93-L95 |
6,806 | aporeto-inc/trireme-lib | controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go | ContextList | func (m *MockRPCClient) ContextList() []string {
ret := m.ctrl.Call(m, "ContextList")
ret0, _ := ret[0].([]string)
return ret0
} | go | func (m *MockRPCClient) ContextList() []string {
ret := m.ctrl.Call(m, "ContextList")
ret0, _ := ret[0].([]string)
return ret0
} | [
"func",
"(",
"m",
"*",
"MockRPCClient",
")",
"ContextList",
"(",
")",
"[",
"]",
"string",
"{",
"ret",
":=",
"m",
".",
"ctrl",
".",
"Call",
"(",
"m",
",",
"\"",
"\"",
")",
"\n",
"ret0",
",",
"_",
":=",
"ret",
"[",
"0",
"]",
".",
"(",
"[",
"]",
"string",
")",
"\n",
"return",
"ret0",
"\n",
"}"
] | // ContextList mocks base method
// nolint | [
"ContextList",
"mocks",
"base",
"method",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go#L99-L103 |
6,807 | aporeto-inc/trireme-lib | controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go | CheckValidity | func (mr *MockRPCClientMockRecorder) CheckValidity(req, secret interface{}) *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CheckValidity", reflect.TypeOf((*MockRPCClient)(nil).CheckValidity), req, secret)
} | go | func (mr *MockRPCClientMockRecorder) CheckValidity(req, secret interface{}) *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CheckValidity", reflect.TypeOf((*MockRPCClient)(nil).CheckValidity), req, secret)
} | [
"func",
"(",
"mr",
"*",
"MockRPCClientMockRecorder",
")",
"CheckValidity",
"(",
"req",
",",
"secret",
"interface",
"{",
"}",
")",
"*",
"gomock",
".",
"Call",
"{",
"return",
"mr",
".",
"mock",
".",
"ctrl",
".",
"RecordCallWithMethodType",
"(",
"mr",
".",
"mock",
",",
"\"",
"\"",
",",
"reflect",
".",
"TypeOf",
"(",
"(",
"*",
"MockRPCClient",
")",
"(",
"nil",
")",
".",
"CheckValidity",
")",
",",
"req",
",",
"secret",
")",
"\n",
"}"
] | // CheckValidity indicates an expected call of CheckValidity
// nolint | [
"CheckValidity",
"indicates",
"an",
"expected",
"call",
"of",
"CheckValidity",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go#L121-L123 |
6,808 | aporeto-inc/trireme-lib | controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go | StartServer | func (m *MockRPCServer) StartServer(ctx context.Context, protocol, path string, handler interface{}) error {
ret := m.ctrl.Call(m, "StartServer", ctx, protocol, path, handler)
ret0, _ := ret[0].(error)
return ret0
} | go | func (m *MockRPCServer) StartServer(ctx context.Context, protocol, path string, handler interface{}) error {
ret := m.ctrl.Call(m, "StartServer", ctx, protocol, path, handler)
ret0, _ := ret[0].(error)
return ret0
} | [
"func",
"(",
"m",
"*",
"MockRPCServer",
")",
"StartServer",
"(",
"ctx",
"context",
".",
"Context",
",",
"protocol",
",",
"path",
"string",
",",
"handler",
"interface",
"{",
"}",
")",
"error",
"{",
"ret",
":=",
"m",
".",
"ctrl",
".",
"Call",
"(",
"m",
",",
"\"",
"\"",
",",
"ctx",
",",
"protocol",
",",
"path",
",",
"handler",
")",
"\n",
"ret0",
",",
"_",
":=",
"ret",
"[",
"0",
"]",
".",
"(",
"error",
")",
"\n",
"return",
"ret0",
"\n",
"}"
] | // StartServer mocks base method
// nolint | [
"StartServer",
"mocks",
"base",
"method",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go#L154-L158 |
6,809 | aporeto-inc/trireme-lib | controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go | StartServer | func (mr *MockRPCServerMockRecorder) StartServer(ctx, protocol, path, handler interface{}) *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "StartServer", reflect.TypeOf((*MockRPCServer)(nil).StartServer), ctx, protocol, path, handler)
} | go | func (mr *MockRPCServerMockRecorder) StartServer(ctx, protocol, path, handler interface{}) *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "StartServer", reflect.TypeOf((*MockRPCServer)(nil).StartServer), ctx, protocol, path, handler)
} | [
"func",
"(",
"mr",
"*",
"MockRPCServerMockRecorder",
")",
"StartServer",
"(",
"ctx",
",",
"protocol",
",",
"path",
",",
"handler",
"interface",
"{",
"}",
")",
"*",
"gomock",
".",
"Call",
"{",
"return",
"mr",
".",
"mock",
".",
"ctrl",
".",
"RecordCallWithMethodType",
"(",
"mr",
".",
"mock",
",",
"\"",
"\"",
",",
"reflect",
".",
"TypeOf",
"(",
"(",
"*",
"MockRPCServer",
")",
"(",
"nil",
")",
".",
"StartServer",
")",
",",
"ctx",
",",
"protocol",
",",
"path",
",",
"handler",
")",
"\n",
"}"
] | // StartServer indicates an expected call of StartServer
// nolint | [
"StartServer",
"indicates",
"an",
"expected",
"call",
"of",
"StartServer",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go#L162-L164 |
6,810 | aporeto-inc/trireme-lib | controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go | ProcessMessage | func (mr *MockRPCServerMockRecorder) ProcessMessage(req, secret interface{}) *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ProcessMessage", reflect.TypeOf((*MockRPCServer)(nil).ProcessMessage), req, secret)
} | go | func (mr *MockRPCServerMockRecorder) ProcessMessage(req, secret interface{}) *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ProcessMessage", reflect.TypeOf((*MockRPCServer)(nil).ProcessMessage), req, secret)
} | [
"func",
"(",
"mr",
"*",
"MockRPCServerMockRecorder",
")",
"ProcessMessage",
"(",
"req",
",",
"secret",
"interface",
"{",
"}",
")",
"*",
"gomock",
".",
"Call",
"{",
"return",
"mr",
".",
"mock",
".",
"ctrl",
".",
"RecordCallWithMethodType",
"(",
"mr",
".",
"mock",
",",
"\"",
"\"",
",",
"reflect",
".",
"TypeOf",
"(",
"(",
"*",
"MockRPCServer",
")",
"(",
"nil",
")",
".",
"ProcessMessage",
")",
",",
"req",
",",
"secret",
")",
"\n",
"}"
] | // ProcessMessage indicates an expected call of ProcessMessage
// nolint | [
"ProcessMessage",
"indicates",
"an",
"expected",
"call",
"of",
"ProcessMessage",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go#L176-L178 |
6,811 | aporeto-inc/trireme-lib | controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go | CheckValidity | func (m *MockRPCServer) CheckValidity(req *rpcwrapper.Request, secret string) bool {
ret := m.ctrl.Call(m, "CheckValidity", req, secret)
ret0, _ := ret[0].(bool)
return ret0
} | go | func (m *MockRPCServer) CheckValidity(req *rpcwrapper.Request, secret string) bool {
ret := m.ctrl.Call(m, "CheckValidity", req, secret)
ret0, _ := ret[0].(bool)
return ret0
} | [
"func",
"(",
"m",
"*",
"MockRPCServer",
")",
"CheckValidity",
"(",
"req",
"*",
"rpcwrapper",
".",
"Request",
",",
"secret",
"string",
")",
"bool",
"{",
"ret",
":=",
"m",
".",
"ctrl",
".",
"Call",
"(",
"m",
",",
"\"",
"\"",
",",
"req",
",",
"secret",
")",
"\n",
"ret0",
",",
"_",
":=",
"ret",
"[",
"0",
"]",
".",
"(",
"bool",
")",
"\n",
"return",
"ret0",
"\n",
"}"
] | // CheckValidity mocks base method
// nolint | [
"CheckValidity",
"mocks",
"base",
"method",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/utils/rpcwrapper/mockrpcwrapper/mockrpcwrapper.go#L182-L186 |
6,812 | aporeto-inc/trireme-lib | monitor/internal/pod/watcher.go | Map | func (w *WatchPodMapper) Map(obj handler.MapObject) []reconcile.Request {
pod, ok := obj.Object.(*corev1.Pod)
if !ok {
return nil
}
if pod.Spec.NodeName != w.nodeName {
return nil
}
if pod.Spec.HostNetwork && !w.enableHostPods {
return nil
}
return []reconcile.Request{
{
NamespacedName: types.NamespacedName{
Name: pod.Name,
Namespace: pod.Namespace,
},
},
}
} | go | func (w *WatchPodMapper) Map(obj handler.MapObject) []reconcile.Request {
pod, ok := obj.Object.(*corev1.Pod)
if !ok {
return nil
}
if pod.Spec.NodeName != w.nodeName {
return nil
}
if pod.Spec.HostNetwork && !w.enableHostPods {
return nil
}
return []reconcile.Request{
{
NamespacedName: types.NamespacedName{
Name: pod.Name,
Namespace: pod.Namespace,
},
},
}
} | [
"func",
"(",
"w",
"*",
"WatchPodMapper",
")",
"Map",
"(",
"obj",
"handler",
".",
"MapObject",
")",
"[",
"]",
"reconcile",
".",
"Request",
"{",
"pod",
",",
"ok",
":=",
"obj",
".",
"Object",
".",
"(",
"*",
"corev1",
".",
"Pod",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"if",
"pod",
".",
"Spec",
".",
"NodeName",
"!=",
"w",
".",
"nodeName",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"if",
"pod",
".",
"Spec",
".",
"HostNetwork",
"&&",
"!",
"w",
".",
"enableHostPods",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"return",
"[",
"]",
"reconcile",
".",
"Request",
"{",
"{",
"NamespacedName",
":",
"types",
".",
"NamespacedName",
"{",
"Name",
":",
"pod",
".",
"Name",
",",
"Namespace",
":",
"pod",
".",
"Namespace",
",",
"}",
",",
"}",
",",
"}",
"\n",
"}"
] | // Map implements the handler.Mapper interface to emit reconciles for corev1.Pods. It effectively
// filters the pods by looking for a matching nodeName and filters them out if host networking is requested,
// but we don't want to enable those. | [
"Map",
"implements",
"the",
"handler",
".",
"Mapper",
"interface",
"to",
"emit",
"reconciles",
"for",
"corev1",
".",
"Pods",
".",
"It",
"effectively",
"filters",
"the",
"pods",
"by",
"looking",
"for",
"a",
"matching",
"nodeName",
"and",
"filters",
"them",
"out",
"if",
"host",
"networking",
"is",
"requested",
"but",
"we",
"don",
"t",
"want",
"to",
"enable",
"those",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/pod/watcher.go#L23-L45 |
6,813 | aporeto-inc/trireme-lib | controller/pkg/pkiverifier/pkiverifier.go | NewPKIIssuer | func NewPKIIssuer(privateKey *ecdsa.PrivateKey) PKITokenIssuer {
return &tokenManager{
privateKey: privateKey,
signMethod: jwt.SigningMethodES256,
}
} | go | func NewPKIIssuer(privateKey *ecdsa.PrivateKey) PKITokenIssuer {
return &tokenManager{
privateKey: privateKey,
signMethod: jwt.SigningMethodES256,
}
} | [
"func",
"NewPKIIssuer",
"(",
"privateKey",
"*",
"ecdsa",
".",
"PrivateKey",
")",
"PKITokenIssuer",
"{",
"return",
"&",
"tokenManager",
"{",
"privateKey",
":",
"privateKey",
",",
"signMethod",
":",
"jwt",
".",
"SigningMethodES256",
",",
"}",
"\n",
"}"
] | // NewPKIIssuer initializes a new signer structure | [
"NewPKIIssuer",
"initializes",
"a",
"new",
"signer",
"structure"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/pkiverifier/pkiverifier.go#L52-L58 |
6,814 | aporeto-inc/trireme-lib | controller/pkg/pkiverifier/pkiverifier.go | NewPKIVerifier | func NewPKIVerifier(publicKeys []*ecdsa.PublicKey, cacheValidity time.Duration) PKITokenVerifier {
validity := defaultValidity * time.Second
if cacheValidity > 0 {
validity = cacheValidity
}
return &tokenManager{
publicKeys: publicKeys,
signMethod: jwt.SigningMethodES256,
keycache: cache.NewCacheWithExpiration("PKIVerifierKey", validity),
validity: validity,
}
} | go | func NewPKIVerifier(publicKeys []*ecdsa.PublicKey, cacheValidity time.Duration) PKITokenVerifier {
validity := defaultValidity * time.Second
if cacheValidity > 0 {
validity = cacheValidity
}
return &tokenManager{
publicKeys: publicKeys,
signMethod: jwt.SigningMethodES256,
keycache: cache.NewCacheWithExpiration("PKIVerifierKey", validity),
validity: validity,
}
} | [
"func",
"NewPKIVerifier",
"(",
"publicKeys",
"[",
"]",
"*",
"ecdsa",
".",
"PublicKey",
",",
"cacheValidity",
"time",
".",
"Duration",
")",
"PKITokenVerifier",
"{",
"validity",
":=",
"defaultValidity",
"*",
"time",
".",
"Second",
"\n",
"if",
"cacheValidity",
">",
"0",
"{",
"validity",
"=",
"cacheValidity",
"\n",
"}",
"\n\n",
"return",
"&",
"tokenManager",
"{",
"publicKeys",
":",
"publicKeys",
",",
"signMethod",
":",
"jwt",
".",
"SigningMethodES256",
",",
"keycache",
":",
"cache",
".",
"NewCacheWithExpiration",
"(",
"\"",
"\"",
",",
"validity",
")",
",",
"validity",
":",
"validity",
",",
"}",
"\n",
"}"
] | // NewPKIVerifier returns a new PKIConfiguration. | [
"NewPKIVerifier",
"returns",
"a",
"new",
"PKIConfiguration",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/pkiverifier/pkiverifier.go#L61-L74 |
6,815 | aporeto-inc/trireme-lib | controller/pkg/pkiverifier/pkiverifier.go | Verify | func (p *tokenManager) Verify(token []byte) (*DatapathKey, error) {
tokenString := string(token)
if pk, err := p.keycache.Get(tokenString); err == nil {
return pk.(*DatapathKey), err
}
claims := &verifierClaims{}
var JWTToken *jwt.Token
var err error
for _, pk := range p.publicKeys {
if pk == nil {
continue
}
JWTToken, err = jwt.ParseWithClaims(tokenString, claims, func(_ *jwt.Token) (interface{}, error) { // nolint
return pk, nil
})
if err != nil || !JWTToken.Valid {
continue
}
dp := &DatapathKey{
PublicKey: KeyFromClaims(claims),
Tags: claims.Tags,
}
if time.Now().Add(p.validity).Unix() <= claims.ExpiresAt {
p.keycache.AddOrUpdate(tokenString, dp)
}
return dp, nil
}
return nil, errors.New("unable to verify token against any available public key")
} | go | func (p *tokenManager) Verify(token []byte) (*DatapathKey, error) {
tokenString := string(token)
if pk, err := p.keycache.Get(tokenString); err == nil {
return pk.(*DatapathKey), err
}
claims := &verifierClaims{}
var JWTToken *jwt.Token
var err error
for _, pk := range p.publicKeys {
if pk == nil {
continue
}
JWTToken, err = jwt.ParseWithClaims(tokenString, claims, func(_ *jwt.Token) (interface{}, error) { // nolint
return pk, nil
})
if err != nil || !JWTToken.Valid {
continue
}
dp := &DatapathKey{
PublicKey: KeyFromClaims(claims),
Tags: claims.Tags,
}
if time.Now().Add(p.validity).Unix() <= claims.ExpiresAt {
p.keycache.AddOrUpdate(tokenString, dp)
}
return dp, nil
}
return nil, errors.New("unable to verify token against any available public key")
} | [
"func",
"(",
"p",
"*",
"tokenManager",
")",
"Verify",
"(",
"token",
"[",
"]",
"byte",
")",
"(",
"*",
"DatapathKey",
",",
"error",
")",
"{",
"tokenString",
":=",
"string",
"(",
"token",
")",
"\n",
"if",
"pk",
",",
"err",
":=",
"p",
".",
"keycache",
".",
"Get",
"(",
"tokenString",
")",
";",
"err",
"==",
"nil",
"{",
"return",
"pk",
".",
"(",
"*",
"DatapathKey",
")",
",",
"err",
"\n",
"}",
"\n\n",
"claims",
":=",
"&",
"verifierClaims",
"{",
"}",
"\n",
"var",
"JWTToken",
"*",
"jwt",
".",
"Token",
"\n",
"var",
"err",
"error",
"\n",
"for",
"_",
",",
"pk",
":=",
"range",
"p",
".",
"publicKeys",
"{",
"if",
"pk",
"==",
"nil",
"{",
"continue",
"\n",
"}",
"\n\n",
"JWTToken",
",",
"err",
"=",
"jwt",
".",
"ParseWithClaims",
"(",
"tokenString",
",",
"claims",
",",
"func",
"(",
"_",
"*",
"jwt",
".",
"Token",
")",
"(",
"interface",
"{",
"}",
",",
"error",
")",
"{",
"// nolint",
"return",
"pk",
",",
"nil",
"\n",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"||",
"!",
"JWTToken",
".",
"Valid",
"{",
"continue",
"\n",
"}",
"\n\n",
"dp",
":=",
"&",
"DatapathKey",
"{",
"PublicKey",
":",
"KeyFromClaims",
"(",
"claims",
")",
",",
"Tags",
":",
"claims",
".",
"Tags",
",",
"}",
"\n\n",
"if",
"time",
".",
"Now",
"(",
")",
".",
"Add",
"(",
"p",
".",
"validity",
")",
".",
"Unix",
"(",
")",
"<=",
"claims",
".",
"ExpiresAt",
"{",
"p",
".",
"keycache",
".",
"AddOrUpdate",
"(",
"tokenString",
",",
"dp",
")",
"\n",
"}",
"\n",
"return",
"dp",
",",
"nil",
"\n",
"}",
"\n\n",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}"
] | // Verify verifies a token and returns the public key | [
"Verify",
"verifies",
"a",
"token",
"and",
"returns",
"the",
"public",
"key"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/pkiverifier/pkiverifier.go#L77-L112 |
6,816 | aporeto-inc/trireme-lib | controller/pkg/pkiverifier/pkiverifier.go | CreateTokenFromCertificate | func (p *tokenManager) CreateTokenFromCertificate(cert *x509.Certificate, tags []string) ([]byte, error) {
// Combine the application claims with the standard claims
claims := &verifierClaims{
X: cert.PublicKey.(*ecdsa.PublicKey).X,
Y: cert.PublicKey.(*ecdsa.PublicKey).Y,
Tags: tags,
}
claims.ExpiresAt = cert.NotAfter.Unix()
// Create the token and sign with our key
strtoken, err := jwt.NewWithClaims(p.signMethod, claims).SignedString(p.privateKey)
if err != nil {
return []byte{}, err
}
return []byte(strtoken), nil
} | go | func (p *tokenManager) CreateTokenFromCertificate(cert *x509.Certificate, tags []string) ([]byte, error) {
// Combine the application claims with the standard claims
claims := &verifierClaims{
X: cert.PublicKey.(*ecdsa.PublicKey).X,
Y: cert.PublicKey.(*ecdsa.PublicKey).Y,
Tags: tags,
}
claims.ExpiresAt = cert.NotAfter.Unix()
// Create the token and sign with our key
strtoken, err := jwt.NewWithClaims(p.signMethod, claims).SignedString(p.privateKey)
if err != nil {
return []byte{}, err
}
return []byte(strtoken), nil
} | [
"func",
"(",
"p",
"*",
"tokenManager",
")",
"CreateTokenFromCertificate",
"(",
"cert",
"*",
"x509",
".",
"Certificate",
",",
"tags",
"[",
"]",
"string",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"// Combine the application claims with the standard claims",
"claims",
":=",
"&",
"verifierClaims",
"{",
"X",
":",
"cert",
".",
"PublicKey",
".",
"(",
"*",
"ecdsa",
".",
"PublicKey",
")",
".",
"X",
",",
"Y",
":",
"cert",
".",
"PublicKey",
".",
"(",
"*",
"ecdsa",
".",
"PublicKey",
")",
".",
"Y",
",",
"Tags",
":",
"tags",
",",
"}",
"\n",
"claims",
".",
"ExpiresAt",
"=",
"cert",
".",
"NotAfter",
".",
"Unix",
"(",
")",
"\n\n",
"// Create the token and sign with our key",
"strtoken",
",",
"err",
":=",
"jwt",
".",
"NewWithClaims",
"(",
"p",
".",
"signMethod",
",",
"claims",
")",
".",
"SignedString",
"(",
"p",
".",
"privateKey",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"[",
"]",
"byte",
"{",
"}",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"[",
"]",
"byte",
"(",
"strtoken",
")",
",",
"nil",
"\n",
"}"
] | // CreateTokenFromCertificate creates and signs a token | [
"CreateTokenFromCertificate",
"creates",
"and",
"signs",
"a",
"token"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/pkiverifier/pkiverifier.go#L115-L132 |
6,817 | aporeto-inc/trireme-lib | controller/pkg/pkiverifier/pkiverifier.go | KeyFromClaims | func KeyFromClaims(claims *verifierClaims) *ecdsa.PublicKey {
return &ecdsa.PublicKey{
Curve: elliptic.P256(),
X: claims.X,
Y: claims.Y,
}
} | go | func KeyFromClaims(claims *verifierClaims) *ecdsa.PublicKey {
return &ecdsa.PublicKey{
Curve: elliptic.P256(),
X: claims.X,
Y: claims.Y,
}
} | [
"func",
"KeyFromClaims",
"(",
"claims",
"*",
"verifierClaims",
")",
"*",
"ecdsa",
".",
"PublicKey",
"{",
"return",
"&",
"ecdsa",
".",
"PublicKey",
"{",
"Curve",
":",
"elliptic",
".",
"P256",
"(",
")",
",",
"X",
":",
"claims",
".",
"X",
",",
"Y",
":",
"claims",
".",
"Y",
",",
"}",
"\n",
"}"
] | // KeyFromClaims creates the public key structure from the claims | [
"KeyFromClaims",
"creates",
"the",
"public",
"key",
"structure",
"from",
"the",
"claims"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/pkiverifier/pkiverifier.go#L135-L141 |
6,818 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/tcp/tcp.go | NewTCPProxy | func NewTCPProxy(
tp tokenaccessor.TokenAccessor,
c collector.EventCollector,
puContext string,
registry *serviceregistry.Registry,
certificate *tls.Certificate,
caPool *x509.CertPool,
) *Proxy {
localIPs := markedconn.GetInterfaces()
return &Proxy{
collector: c,
tokenaccessor: tp,
puContext: puContext,
registry: registry,
localIPs: localIPs,
certificate: certificate,
ca: caPool,
}
} | go | func NewTCPProxy(
tp tokenaccessor.TokenAccessor,
c collector.EventCollector,
puContext string,
registry *serviceregistry.Registry,
certificate *tls.Certificate,
caPool *x509.CertPool,
) *Proxy {
localIPs := markedconn.GetInterfaces()
return &Proxy{
collector: c,
tokenaccessor: tp,
puContext: puContext,
registry: registry,
localIPs: localIPs,
certificate: certificate,
ca: caPool,
}
} | [
"func",
"NewTCPProxy",
"(",
"tp",
"tokenaccessor",
".",
"TokenAccessor",
",",
"c",
"collector",
".",
"EventCollector",
",",
"puContext",
"string",
",",
"registry",
"*",
"serviceregistry",
".",
"Registry",
",",
"certificate",
"*",
"tls",
".",
"Certificate",
",",
"caPool",
"*",
"x509",
".",
"CertPool",
",",
")",
"*",
"Proxy",
"{",
"localIPs",
":=",
"markedconn",
".",
"GetInterfaces",
"(",
")",
"\n\n",
"return",
"&",
"Proxy",
"{",
"collector",
":",
"c",
",",
"tokenaccessor",
":",
"tp",
",",
"puContext",
":",
"puContext",
",",
"registry",
":",
"registry",
",",
"localIPs",
":",
"localIPs",
",",
"certificate",
":",
"certificate",
",",
"ca",
":",
"caPool",
",",
"}",
"\n",
"}"
] | // NewTCPProxy creates a new instance of proxy reate a new instance of Proxy | [
"NewTCPProxy",
"creates",
"a",
"new",
"instance",
"of",
"proxy",
"reate",
"a",
"new",
"instance",
"of",
"Proxy"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/tcp/tcp.go#L66-L86 |
6,819 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/tcp/tcp.go | RunNetworkServer | func (p *Proxy) RunNetworkServer(ctx context.Context, listener net.Listener, encrypted bool) error {
// Encryption is done transparently for TCP.
go p.serve(ctx, listener)
return nil
} | go | func (p *Proxy) RunNetworkServer(ctx context.Context, listener net.Listener, encrypted bool) error {
// Encryption is done transparently for TCP.
go p.serve(ctx, listener)
return nil
} | [
"func",
"(",
"p",
"*",
"Proxy",
")",
"RunNetworkServer",
"(",
"ctx",
"context",
".",
"Context",
",",
"listener",
"net",
".",
"Listener",
",",
"encrypted",
"bool",
")",
"error",
"{",
"// Encryption is done transparently for TCP.",
"go",
"p",
".",
"serve",
"(",
"ctx",
",",
"listener",
")",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // RunNetworkServer implements enforcer.Enforcer interface | [
"RunNetworkServer",
"implements",
"enforcer",
".",
"Enforcer",
"interface"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/tcp/tcp.go#L89-L95 |
6,820 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/tcp/tcp.go | UpdateSecrets | func (p *Proxy) UpdateSecrets(cert *tls.Certificate, caPool *x509.CertPool, s secrets.Secrets, certPEM, keyPEM string) {
p.Lock()
defer p.Unlock()
p.certificate = cert
p.ca = caPool
} | go | func (p *Proxy) UpdateSecrets(cert *tls.Certificate, caPool *x509.CertPool, s secrets.Secrets, certPEM, keyPEM string) {
p.Lock()
defer p.Unlock()
p.certificate = cert
p.ca = caPool
} | [
"func",
"(",
"p",
"*",
"Proxy",
")",
"UpdateSecrets",
"(",
"cert",
"*",
"tls",
".",
"Certificate",
",",
"caPool",
"*",
"x509",
".",
"CertPool",
",",
"s",
"secrets",
".",
"Secrets",
",",
"certPEM",
",",
"keyPEM",
"string",
")",
"{",
"p",
".",
"Lock",
"(",
")",
"\n",
"defer",
"p",
".",
"Unlock",
"(",
")",
"\n\n",
"p",
".",
"certificate",
"=",
"cert",
"\n",
"p",
".",
"ca",
"=",
"caPool",
"\n",
"}"
] | // UpdateSecrets updates the secrets of the connections. | [
"UpdateSecrets",
"updates",
"the",
"secrets",
"of",
"the",
"connections",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/tcp/tcp.go#L98-L104 |
6,821 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/tcp/tcp.go | handle | func (p *Proxy) handle(ctx context.Context, upConn net.Conn) {
defer upConn.Close() // nolint
ip, port := upConn.(*markedconn.ProxiedConnection).GetOriginalDestination()
downConn, err := p.downConnection(ctx, ip, port)
if err != nil {
flowproperties := &proxyFlowProperties{
DestIP: ip.String(),
DestPort: uint16(port),
SourceIP: upConn.RemoteAddr().(*net.TCPAddr).IP.String(),
DestType: collector.EndPointTypeExternalIP,
SourceType: collector.EnpointTypePU,
}
puContext, perr := p.puContextFromContextID(p.puContext)
if perr != nil {
zap.L().Error("Unable to find policy context for tcp connection",
zap.String("Context", p.puContext),
zap.Error(perr))
return
}
p.reportRejectedFlow(flowproperties, puContext.ManagementID(), "default", puContext, collector.UnableToDial, nil, nil)
return
}
defer downConn.Close() // nolint
// Now let us handle the state machine for the down connection
isEncrypted, err := p.CompleteEndPointAuthorization(ip, port, upConn, downConn)
if err != nil {
zap.L().Error("Error on Authorization", zap.Error(err))
return
}
if err := p.proxyData(ctx, isEncrypted, upConn, downConn); err != nil {
zap.L().Debug("Error will proxying data", zap.Error(err))
}
} | go | func (p *Proxy) handle(ctx context.Context, upConn net.Conn) {
defer upConn.Close() // nolint
ip, port := upConn.(*markedconn.ProxiedConnection).GetOriginalDestination()
downConn, err := p.downConnection(ctx, ip, port)
if err != nil {
flowproperties := &proxyFlowProperties{
DestIP: ip.String(),
DestPort: uint16(port),
SourceIP: upConn.RemoteAddr().(*net.TCPAddr).IP.String(),
DestType: collector.EndPointTypeExternalIP,
SourceType: collector.EnpointTypePU,
}
puContext, perr := p.puContextFromContextID(p.puContext)
if perr != nil {
zap.L().Error("Unable to find policy context for tcp connection",
zap.String("Context", p.puContext),
zap.Error(perr))
return
}
p.reportRejectedFlow(flowproperties, puContext.ManagementID(), "default", puContext, collector.UnableToDial, nil, nil)
return
}
defer downConn.Close() // nolint
// Now let us handle the state machine for the down connection
isEncrypted, err := p.CompleteEndPointAuthorization(ip, port, upConn, downConn)
if err != nil {
zap.L().Error("Error on Authorization", zap.Error(err))
return
}
if err := p.proxyData(ctx, isEncrypted, upConn, downConn); err != nil {
zap.L().Debug("Error will proxying data", zap.Error(err))
}
} | [
"func",
"(",
"p",
"*",
"Proxy",
")",
"handle",
"(",
"ctx",
"context",
".",
"Context",
",",
"upConn",
"net",
".",
"Conn",
")",
"{",
"defer",
"upConn",
".",
"Close",
"(",
")",
"// nolint",
"\n",
"ip",
",",
"port",
":=",
"upConn",
".",
"(",
"*",
"markedconn",
".",
"ProxiedConnection",
")",
".",
"GetOriginalDestination",
"(",
")",
"\n\n",
"downConn",
",",
"err",
":=",
"p",
".",
"downConnection",
"(",
"ctx",
",",
"ip",
",",
"port",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"flowproperties",
":=",
"&",
"proxyFlowProperties",
"{",
"DestIP",
":",
"ip",
".",
"String",
"(",
")",
",",
"DestPort",
":",
"uint16",
"(",
"port",
")",
",",
"SourceIP",
":",
"upConn",
".",
"RemoteAddr",
"(",
")",
".",
"(",
"*",
"net",
".",
"TCPAddr",
")",
".",
"IP",
".",
"String",
"(",
")",
",",
"DestType",
":",
"collector",
".",
"EndPointTypeExternalIP",
",",
"SourceType",
":",
"collector",
".",
"EnpointTypePU",
",",
"}",
"\n\n",
"puContext",
",",
"perr",
":=",
"p",
".",
"puContextFromContextID",
"(",
"p",
".",
"puContext",
")",
"\n",
"if",
"perr",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"p",
".",
"puContext",
")",
",",
"zap",
".",
"Error",
"(",
"perr",
")",
")",
"\n",
"return",
"\n",
"}",
"\n\n",
"p",
".",
"reportRejectedFlow",
"(",
"flowproperties",
",",
"puContext",
".",
"ManagementID",
"(",
")",
",",
"\"",
"\"",
",",
"puContext",
",",
"collector",
".",
"UnableToDial",
",",
"nil",
",",
"nil",
")",
"\n",
"return",
"\n",
"}",
"\n",
"defer",
"downConn",
".",
"Close",
"(",
")",
"// nolint",
"\n\n",
"// Now let us handle the state machine for the down connection",
"isEncrypted",
",",
"err",
":=",
"p",
".",
"CompleteEndPointAuthorization",
"(",
"ip",
",",
"port",
",",
"upConn",
",",
"downConn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"return",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"p",
".",
"proxyData",
"(",
"ctx",
",",
"isEncrypted",
",",
"upConn",
",",
"downConn",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n",
"}"
] | // handle handles a connection | [
"handle",
"handles",
"a",
"connection"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/tcp/tcp.go#L127-L164 |
6,822 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/tcp/tcp.go | downConnection | func (p *Proxy) downConnection(ctx context.Context, ip net.IP, port int) (net.Conn, error) {
raddr := &net.TCPAddr{
IP: ip,
Port: port,
}
return markedconn.DialMarkedWithContext(ctx, "tcp4", raddr.String(), proxyMarkInt)
} | go | func (p *Proxy) downConnection(ctx context.Context, ip net.IP, port int) (net.Conn, error) {
raddr := &net.TCPAddr{
IP: ip,
Port: port,
}
return markedconn.DialMarkedWithContext(ctx, "tcp4", raddr.String(), proxyMarkInt)
} | [
"func",
"(",
"p",
"*",
"Proxy",
")",
"downConnection",
"(",
"ctx",
"context",
".",
"Context",
",",
"ip",
"net",
".",
"IP",
",",
"port",
"int",
")",
"(",
"net",
".",
"Conn",
",",
"error",
")",
"{",
"raddr",
":=",
"&",
"net",
".",
"TCPAddr",
"{",
"IP",
":",
"ip",
",",
"Port",
":",
"port",
",",
"}",
"\n\n",
"return",
"markedconn",
".",
"DialMarkedWithContext",
"(",
"ctx",
",",
"\"",
"\"",
",",
"raddr",
".",
"String",
"(",
")",
",",
"proxyMarkInt",
")",
"\n\n",
"}"
] | // Initiate the downstream connection | [
"Initiate",
"the",
"downstream",
"connection"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/tcp/tcp.go#L274-L283 |
6,823 | aporeto-inc/trireme-lib | monitor/internal/kubernetes/handler.go | RefreshPUs | func (m *KubernetesMonitor) RefreshPUs(ctx context.Context, pod *api.Pod) error {
if pod == nil {
return fmt.Errorf("pod is nil")
}
podNamespace := pod.GetNamespace()
podName := pod.GetName()
puIDs := m.cache.getPUIDsbyPod(podNamespace, podName)
for _, puid := range puIDs {
dockerRuntime := m.cache.getDockerRuntimeByPUID(puid)
if dockerRuntime == nil {
continue
}
kubernetesRuntime, managedContainer, err := m.kubernetesExtractor(dockerRuntime, pod)
if err != nil {
return fmt.Errorf("error while processing Kubernetes pod %s/%s for container %s %s", podNamespace, podName, puid, err)
}
// UnmanagedContainers are simply ignored. It should not come this far if it is a non managed container anyways.
if !managedContainer {
zap.L().Debug("unmanaged Kubernetes container", zap.String("puID", puid), zap.String("podNamespace", podNamespace), zap.String("podName", podName))
continue
}
// We keep the cache uptoDate for future queries
m.cache.updatePUIDCache(podNamespace, podName, puid, dockerRuntime, kubernetesRuntime)
if err := m.handlers.Policy.HandlePUEvent(ctx, puid, common.EventUpdate, kubernetesRuntime); err != nil {
return err
}
}
return nil
} | go | func (m *KubernetesMonitor) RefreshPUs(ctx context.Context, pod *api.Pod) error {
if pod == nil {
return fmt.Errorf("pod is nil")
}
podNamespace := pod.GetNamespace()
podName := pod.GetName()
puIDs := m.cache.getPUIDsbyPod(podNamespace, podName)
for _, puid := range puIDs {
dockerRuntime := m.cache.getDockerRuntimeByPUID(puid)
if dockerRuntime == nil {
continue
}
kubernetesRuntime, managedContainer, err := m.kubernetesExtractor(dockerRuntime, pod)
if err != nil {
return fmt.Errorf("error while processing Kubernetes pod %s/%s for container %s %s", podNamespace, podName, puid, err)
}
// UnmanagedContainers are simply ignored. It should not come this far if it is a non managed container anyways.
if !managedContainer {
zap.L().Debug("unmanaged Kubernetes container", zap.String("puID", puid), zap.String("podNamespace", podNamespace), zap.String("podName", podName))
continue
}
// We keep the cache uptoDate for future queries
m.cache.updatePUIDCache(podNamespace, podName, puid, dockerRuntime, kubernetesRuntime)
if err := m.handlers.Policy.HandlePUEvent(ctx, puid, common.EventUpdate, kubernetesRuntime); err != nil {
return err
}
}
return nil
} | [
"func",
"(",
"m",
"*",
"KubernetesMonitor",
")",
"RefreshPUs",
"(",
"ctx",
"context",
".",
"Context",
",",
"pod",
"*",
"api",
".",
"Pod",
")",
"error",
"{",
"if",
"pod",
"==",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"podNamespace",
":=",
"pod",
".",
"GetNamespace",
"(",
")",
"\n",
"podName",
":=",
"pod",
".",
"GetName",
"(",
")",
"\n\n",
"puIDs",
":=",
"m",
".",
"cache",
".",
"getPUIDsbyPod",
"(",
"podNamespace",
",",
"podName",
")",
"\n\n",
"for",
"_",
",",
"puid",
":=",
"range",
"puIDs",
"{",
"dockerRuntime",
":=",
"m",
".",
"cache",
".",
"getDockerRuntimeByPUID",
"(",
"puid",
")",
"\n",
"if",
"dockerRuntime",
"==",
"nil",
"{",
"continue",
"\n",
"}",
"\n\n",
"kubernetesRuntime",
",",
"managedContainer",
",",
"err",
":=",
"m",
".",
"kubernetesExtractor",
"(",
"dockerRuntime",
",",
"pod",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"podNamespace",
",",
"podName",
",",
"puid",
",",
"err",
")",
"\n",
"}",
"\n\n",
"// UnmanagedContainers are simply ignored. It should not come this far if it is a non managed container anyways.",
"if",
"!",
"managedContainer",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"puid",
")",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"podNamespace",
")",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"podName",
")",
")",
"\n",
"continue",
"\n",
"}",
"\n\n",
"// We keep the cache uptoDate for future queries",
"m",
".",
"cache",
".",
"updatePUIDCache",
"(",
"podNamespace",
",",
"podName",
",",
"puid",
",",
"dockerRuntime",
",",
"kubernetesRuntime",
")",
"\n\n",
"if",
"err",
":=",
"m",
".",
"handlers",
".",
"Policy",
".",
"HandlePUEvent",
"(",
"ctx",
",",
"puid",
",",
"common",
".",
"EventUpdate",
",",
"kubernetesRuntime",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // RefreshPUs is used to resend an update event to the Upstream Policy Resolver in case of an update is needed. | [
"RefreshPUs",
"is",
"used",
"to",
"resend",
"an",
"update",
"event",
"to",
"the",
"Upstream",
"Policy",
"Resolver",
"in",
"case",
"of",
"an",
"update",
"is",
"needed",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/kubernetes/handler.go#L91-L127 |
6,824 | aporeto-inc/trireme-lib | monitor/internal/kubernetes/handler.go | getKubernetesInformation | func getKubernetesInformation(runtime policy.RuntimeReader) (string, string, error) {
podNamespace, ok := runtime.Tag(KubernetesPodNamespaceIdentifier)
if !ok {
return "", "", fmt.Errorf("Error getting Kubernetes Pod namespace")
}
podName, ok := runtime.Tag(KubernetesPodNameIdentifier)
if !ok {
return "", "", fmt.Errorf("Error getting Kubernetes Pod name")
}
return podNamespace, podName, nil
} | go | func getKubernetesInformation(runtime policy.RuntimeReader) (string, string, error) {
podNamespace, ok := runtime.Tag(KubernetesPodNamespaceIdentifier)
if !ok {
return "", "", fmt.Errorf("Error getting Kubernetes Pod namespace")
}
podName, ok := runtime.Tag(KubernetesPodNameIdentifier)
if !ok {
return "", "", fmt.Errorf("Error getting Kubernetes Pod name")
}
return podNamespace, podName, nil
} | [
"func",
"getKubernetesInformation",
"(",
"runtime",
"policy",
".",
"RuntimeReader",
")",
"(",
"string",
",",
"string",
",",
"error",
")",
"{",
"podNamespace",
",",
"ok",
":=",
"runtime",
".",
"Tag",
"(",
"KubernetesPodNamespaceIdentifier",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"\"",
"\"",
",",
"\"",
"\"",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"podName",
",",
"ok",
":=",
"runtime",
".",
"Tag",
"(",
"KubernetesPodNameIdentifier",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"\"",
"\"",
",",
"\"",
"\"",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"podNamespace",
",",
"podName",
",",
"nil",
"\n",
"}"
] | // getKubernetesInformation returns the name and namespace from a standard Docker runtime, if the docker container is associated at all with Kubernetes | [
"getKubernetesInformation",
"returns",
"the",
"name",
"and",
"namespace",
"from",
"a",
"standard",
"Docker",
"runtime",
"if",
"the",
"docker",
"container",
"is",
"associated",
"at",
"all",
"with",
"Kubernetes"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/kubernetes/handler.go#L130-L141 |
6,825 | aporeto-inc/trireme-lib | monitor/internal/kubernetes/handler.go | decorateRuntime | func (m *KubernetesMonitor) decorateRuntime(puID string, runtimeInfo policy.RuntimeReader, event common.Event,
podName, podNamespace string) (err error) {
// Do nothing on other events apart from start event.
if event != common.EventStart {
return nil
}
puRuntime, ok := runtimeInfo.(*policy.PURuntime)
if !ok {
zap.L().Error("Found invalid runtime for puid", zap.String("puid", puID))
return fmt.Errorf("invalid runtime for puid:%s", puID)
}
extensions := policy.ExtendedMap{}
// pause container with host net set to true.
if runtimeInfo.PUType() == common.LinuxProcessPU {
extensions[constants.DockerHostMode] = "true"
extensions[constants.DockerHostPUID] = puID
options := puRuntime.Options()
options.PolicyExtensions = extensions
// set Options on docker runtime.
puRuntime.SetOptions(options)
return nil
}
pausePUID := ""
puIDs := m.cache.getPUIDsbyPod(podNamespace, podName)
// get the puid of the pause container.
for _, id := range puIDs {
rtm := m.cache.getDockerRuntimeByPUID(id)
if rtm == nil {
continue
}
if isPodInfraContainer(rtm) && rtm.PUType() == common.LinuxProcessPU {
pausePUID = id
break
}
// if the pause container is not host net container, nothing to do.
if isPodInfraContainer(rtm) {
return nil
}
}
extensions[constants.DockerHostPUID] = pausePUID
options := puRuntime.Options()
options.PolicyExtensions = extensions
// set Options on docker runtime.
puRuntime.SetOptions(options)
return nil
} | go | func (m *KubernetesMonitor) decorateRuntime(puID string, runtimeInfo policy.RuntimeReader, event common.Event,
podName, podNamespace string) (err error) {
// Do nothing on other events apart from start event.
if event != common.EventStart {
return nil
}
puRuntime, ok := runtimeInfo.(*policy.PURuntime)
if !ok {
zap.L().Error("Found invalid runtime for puid", zap.String("puid", puID))
return fmt.Errorf("invalid runtime for puid:%s", puID)
}
extensions := policy.ExtendedMap{}
// pause container with host net set to true.
if runtimeInfo.PUType() == common.LinuxProcessPU {
extensions[constants.DockerHostMode] = "true"
extensions[constants.DockerHostPUID] = puID
options := puRuntime.Options()
options.PolicyExtensions = extensions
// set Options on docker runtime.
puRuntime.SetOptions(options)
return nil
}
pausePUID := ""
puIDs := m.cache.getPUIDsbyPod(podNamespace, podName)
// get the puid of the pause container.
for _, id := range puIDs {
rtm := m.cache.getDockerRuntimeByPUID(id)
if rtm == nil {
continue
}
if isPodInfraContainer(rtm) && rtm.PUType() == common.LinuxProcessPU {
pausePUID = id
break
}
// if the pause container is not host net container, nothing to do.
if isPodInfraContainer(rtm) {
return nil
}
}
extensions[constants.DockerHostPUID] = pausePUID
options := puRuntime.Options()
options.PolicyExtensions = extensions
// set Options on docker runtime.
puRuntime.SetOptions(options)
return nil
} | [
"func",
"(",
"m",
"*",
"KubernetesMonitor",
")",
"decorateRuntime",
"(",
"puID",
"string",
",",
"runtimeInfo",
"policy",
".",
"RuntimeReader",
",",
"event",
"common",
".",
"Event",
",",
"podName",
",",
"podNamespace",
"string",
")",
"(",
"err",
"error",
")",
"{",
"// Do nothing on other events apart from start event.",
"if",
"event",
"!=",
"common",
".",
"EventStart",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"puRuntime",
",",
"ok",
":=",
"runtimeInfo",
".",
"(",
"*",
"policy",
".",
"PURuntime",
")",
"\n",
"if",
"!",
"ok",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"puID",
")",
")",
"\n",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"puID",
")",
"\n",
"}",
"\n\n",
"extensions",
":=",
"policy",
".",
"ExtendedMap",
"{",
"}",
"\n\n",
"// pause container with host net set to true.",
"if",
"runtimeInfo",
".",
"PUType",
"(",
")",
"==",
"common",
".",
"LinuxProcessPU",
"{",
"extensions",
"[",
"constants",
".",
"DockerHostMode",
"]",
"=",
"\"",
"\"",
"\n",
"extensions",
"[",
"constants",
".",
"DockerHostPUID",
"]",
"=",
"puID",
"\n",
"options",
":=",
"puRuntime",
".",
"Options",
"(",
")",
"\n",
"options",
".",
"PolicyExtensions",
"=",
"extensions",
"\n\n",
"// set Options on docker runtime.",
"puRuntime",
".",
"SetOptions",
"(",
"options",
")",
"\n",
"return",
"nil",
"\n",
"}",
"\n\n",
"pausePUID",
":=",
"\"",
"\"",
"\n",
"puIDs",
":=",
"m",
".",
"cache",
".",
"getPUIDsbyPod",
"(",
"podNamespace",
",",
"podName",
")",
"\n",
"// get the puid of the pause container.",
"for",
"_",
",",
"id",
":=",
"range",
"puIDs",
"{",
"rtm",
":=",
"m",
".",
"cache",
".",
"getDockerRuntimeByPUID",
"(",
"id",
")",
"\n",
"if",
"rtm",
"==",
"nil",
"{",
"continue",
"\n",
"}",
"\n\n",
"if",
"isPodInfraContainer",
"(",
"rtm",
")",
"&&",
"rtm",
".",
"PUType",
"(",
")",
"==",
"common",
".",
"LinuxProcessPU",
"{",
"pausePUID",
"=",
"id",
"\n",
"break",
"\n",
"}",
"\n\n",
"// if the pause container is not host net container, nothing to do.",
"if",
"isPodInfraContainer",
"(",
"rtm",
")",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"}",
"\n\n",
"extensions",
"[",
"constants",
".",
"DockerHostPUID",
"]",
"=",
"pausePUID",
"\n",
"options",
":=",
"puRuntime",
".",
"Options",
"(",
")",
"\n",
"options",
".",
"PolicyExtensions",
"=",
"extensions",
"\n",
"// set Options on docker runtime.",
"puRuntime",
".",
"SetOptions",
"(",
"options",
")",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // decorateRuntime decorates the docker runtime with puid of the pause container. | [
"decorateRuntime",
"decorates",
"the",
"docker",
"runtime",
"with",
"puid",
"of",
"the",
"pause",
"container",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/kubernetes/handler.go#L144-L199 |
6,826 | aporeto-inc/trireme-lib | controller/pkg/remoteenforcer/internal/statsclient/mockstatsclient/mockstatsclient.go | NewMockStatsClient | func NewMockStatsClient(ctrl *gomock.Controller) *MockStatsClient {
mock := &MockStatsClient{ctrl: ctrl}
mock.recorder = &MockStatsClientMockRecorder{mock}
return mock
} | go | func NewMockStatsClient(ctrl *gomock.Controller) *MockStatsClient {
mock := &MockStatsClient{ctrl: ctrl}
mock.recorder = &MockStatsClientMockRecorder{mock}
return mock
} | [
"func",
"NewMockStatsClient",
"(",
"ctrl",
"*",
"gomock",
".",
"Controller",
")",
"*",
"MockStatsClient",
"{",
"mock",
":=",
"&",
"MockStatsClient",
"{",
"ctrl",
":",
"ctrl",
"}",
"\n",
"mock",
".",
"recorder",
"=",
"&",
"MockStatsClientMockRecorder",
"{",
"mock",
"}",
"\n",
"return",
"mock",
"\n",
"}"
] | // NewMockStatsClient creates a new mock instance
// nolint | [
"NewMockStatsClient",
"creates",
"a",
"new",
"mock",
"instance",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/remoteenforcer/internal/statsclient/mockstatsclient/mockstatsclient.go#L29-L33 |
6,827 | aporeto-inc/trireme-lib | controller/pkg/remoteenforcer/internal/statsclient/mockstatsclient/mockstatsclient.go | SendStats | func (mr *MockStatsClientMockRecorder) SendStats() *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SendStats", reflect.TypeOf((*MockStatsClient)(nil).SendStats))
} | go | func (mr *MockStatsClientMockRecorder) SendStats() *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SendStats", reflect.TypeOf((*MockStatsClient)(nil).SendStats))
} | [
"func",
"(",
"mr",
"*",
"MockStatsClientMockRecorder",
")",
"SendStats",
"(",
")",
"*",
"gomock",
".",
"Call",
"{",
"return",
"mr",
".",
"mock",
".",
"ctrl",
".",
"RecordCallWithMethodType",
"(",
"mr",
".",
"mock",
",",
"\"",
"\"",
",",
"reflect",
".",
"TypeOf",
"(",
"(",
"*",
"MockStatsClient",
")",
"(",
"nil",
")",
".",
"SendStats",
")",
")",
"\n",
"}"
] | // SendStats indicates an expected call of SendStats
// nolint | [
"SendStats",
"indicates",
"an",
"expected",
"call",
"of",
"SendStats",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/remoteenforcer/internal/statsclient/mockstatsclient/mockstatsclient.go#L63-L65 |
6,828 | aporeto-inc/trireme-lib | controller/internal/enforcer/nfqdatapath/datapath_udp.go | processNetUDPPacket | func (d *Datapath) processNetUDPPacket(udpPacket *packet.Packet, context *pucontext.PUContext, conn *connection.UDPConnection) (action interface{}, claims *tokens.ConnectionClaims, err error) {
// Extra check, just in case the caller didn't provide a connection.
if conn == nil {
return nil, nil, fmt.Errorf("no connection provided")
}
udpPacketType := udpPacket.GetUDPType()
// Update connection state in the internal state machine tracker
switch udpPacketType {
case packet.UDPSynMask:
// Parse the packet for the identity information.
action, claims, err = d.processNetworkUDPSynPacket(context, conn, udpPacket)
if err != nil {
return nil, nil, err
}
// Send the return packet.
if err = d.sendUDPSynAckPacket(udpPacket, context, conn); err != nil {
return nil, nil, err
}
// Mark the state that we have transmitted a SynAck packet.
conn.SetState(connection.UDPReceiverSendSynAck)
return action, claims, nil
case packet.UDPAckMask:
// Retrieve the header and parse the signatures.
if err = d.processNetworkUDPAckPacket(udpPacket, context, conn); err != nil {
zap.L().Error("Error during authorization", zap.Error(err))
return nil, nil, err
}
// Set the connection to
conn.SetState(connection.UDPReceiverProcessedAck)
return nil, nil, nil
case packet.UDPSynAckMask:
// Process the synack header and claims of the other side.
action, claims, err = d.processNetworkUDPSynAckPacket(udpPacket, context, conn)
if err != nil {
zap.L().Error("UDP Syn ack failed with", zap.Error(err))
return nil, nil, err
}
// Send back the acknowledgement.
err = d.sendUDPAckPacket(udpPacket, context, conn)
if err != nil {
zap.L().Error("Unable to send udp Syn ack failed", zap.Error(err))
return nil, nil, err
}
conn.SetState(connection.UDPClientSendAck)
return action, claims, nil
default:
state := conn.GetState()
if state == connection.UDPReceiverProcessedAck || state == connection.UDPClientSendAck || state == connection.UDPData {
conn.SetState(connection.UDPData)
return nil, nil, nil
}
return nil, nil, fmt.Errorf("invalid packet at state: %d", state)
}
} | go | func (d *Datapath) processNetUDPPacket(udpPacket *packet.Packet, context *pucontext.PUContext, conn *connection.UDPConnection) (action interface{}, claims *tokens.ConnectionClaims, err error) {
// Extra check, just in case the caller didn't provide a connection.
if conn == nil {
return nil, nil, fmt.Errorf("no connection provided")
}
udpPacketType := udpPacket.GetUDPType()
// Update connection state in the internal state machine tracker
switch udpPacketType {
case packet.UDPSynMask:
// Parse the packet for the identity information.
action, claims, err = d.processNetworkUDPSynPacket(context, conn, udpPacket)
if err != nil {
return nil, nil, err
}
// Send the return packet.
if err = d.sendUDPSynAckPacket(udpPacket, context, conn); err != nil {
return nil, nil, err
}
// Mark the state that we have transmitted a SynAck packet.
conn.SetState(connection.UDPReceiverSendSynAck)
return action, claims, nil
case packet.UDPAckMask:
// Retrieve the header and parse the signatures.
if err = d.processNetworkUDPAckPacket(udpPacket, context, conn); err != nil {
zap.L().Error("Error during authorization", zap.Error(err))
return nil, nil, err
}
// Set the connection to
conn.SetState(connection.UDPReceiverProcessedAck)
return nil, nil, nil
case packet.UDPSynAckMask:
// Process the synack header and claims of the other side.
action, claims, err = d.processNetworkUDPSynAckPacket(udpPacket, context, conn)
if err != nil {
zap.L().Error("UDP Syn ack failed with", zap.Error(err))
return nil, nil, err
}
// Send back the acknowledgement.
err = d.sendUDPAckPacket(udpPacket, context, conn)
if err != nil {
zap.L().Error("Unable to send udp Syn ack failed", zap.Error(err))
return nil, nil, err
}
conn.SetState(connection.UDPClientSendAck)
return action, claims, nil
default:
state := conn.GetState()
if state == connection.UDPReceiverProcessedAck || state == connection.UDPClientSendAck || state == connection.UDPData {
conn.SetState(connection.UDPData)
return nil, nil, nil
}
return nil, nil, fmt.Errorf("invalid packet at state: %d", state)
}
} | [
"func",
"(",
"d",
"*",
"Datapath",
")",
"processNetUDPPacket",
"(",
"udpPacket",
"*",
"packet",
".",
"Packet",
",",
"context",
"*",
"pucontext",
".",
"PUContext",
",",
"conn",
"*",
"connection",
".",
"UDPConnection",
")",
"(",
"action",
"interface",
"{",
"}",
",",
"claims",
"*",
"tokens",
".",
"ConnectionClaims",
",",
"err",
"error",
")",
"{",
"// Extra check, just in case the caller didn't provide a connection.",
"if",
"conn",
"==",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"udpPacketType",
":=",
"udpPacket",
".",
"GetUDPType",
"(",
")",
"\n\n",
"// Update connection state in the internal state machine tracker",
"switch",
"udpPacketType",
"{",
"case",
"packet",
".",
"UDPSynMask",
":",
"// Parse the packet for the identity information.",
"action",
",",
"claims",
",",
"err",
"=",
"d",
".",
"processNetworkUDPSynPacket",
"(",
"context",
",",
"conn",
",",
"udpPacket",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"// Send the return packet.",
"if",
"err",
"=",
"d",
".",
"sendUDPSynAckPacket",
"(",
"udpPacket",
",",
"context",
",",
"conn",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"// Mark the state that we have transmitted a SynAck packet.",
"conn",
".",
"SetState",
"(",
"connection",
".",
"UDPReceiverSendSynAck",
")",
"\n",
"return",
"action",
",",
"claims",
",",
"nil",
"\n\n",
"case",
"packet",
".",
"UDPAckMask",
":",
"// Retrieve the header and parse the signatures.",
"if",
"err",
"=",
"d",
".",
"processNetworkUDPAckPacket",
"(",
"udpPacket",
",",
"context",
",",
"conn",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"// Set the connection to",
"conn",
".",
"SetState",
"(",
"connection",
".",
"UDPReceiverProcessedAck",
")",
"\n",
"return",
"nil",
",",
"nil",
",",
"nil",
"\n\n",
"case",
"packet",
".",
"UDPSynAckMask",
":",
"// Process the synack header and claims of the other side.",
"action",
",",
"claims",
",",
"err",
"=",
"d",
".",
"processNetworkUDPSynAckPacket",
"(",
"udpPacket",
",",
"context",
",",
"conn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"// Send back the acknowledgement.",
"err",
"=",
"d",
".",
"sendUDPAckPacket",
"(",
"udpPacket",
",",
"context",
",",
"conn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"conn",
".",
"SetState",
"(",
"connection",
".",
"UDPClientSendAck",
")",
"\n\n",
"return",
"action",
",",
"claims",
",",
"nil",
"\n\n",
"default",
":",
"state",
":=",
"conn",
".",
"GetState",
"(",
")",
"\n",
"if",
"state",
"==",
"connection",
".",
"UDPReceiverProcessedAck",
"||",
"state",
"==",
"connection",
".",
"UDPClientSendAck",
"||",
"state",
"==",
"connection",
".",
"UDPData",
"{",
"conn",
".",
"SetState",
"(",
"connection",
".",
"UDPData",
")",
"\n",
"return",
"nil",
",",
"nil",
",",
"nil",
"\n",
"}",
"\n",
"return",
"nil",
",",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"state",
")",
"\n",
"}",
"\n",
"}"
] | // processNetUDPPacket processes a network UDP packet and dispatches it to different methods based on the flags.
// This applies only to control packets. | [
"processNetUDPPacket",
"processes",
"a",
"network",
"UDP",
"packet",
"and",
"dispatches",
"it",
"to",
"different",
"methods",
"based",
"on",
"the",
"flags",
".",
"This",
"applies",
"only",
"to",
"control",
"packets",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/nfqdatapath/datapath_udp.go#L199-L266 |
6,829 | aporeto-inc/trireme-lib | controller/internal/enforcer/nfqdatapath/datapath_udp.go | ProcessApplicationUDPPacket | func (d *Datapath) ProcessApplicationUDPPacket(p *packet.Packet) (conn *connection.UDPConnection, err error) {
if d.packetLogs {
zap.L().Debug("Processing application UDP packet ",
zap.String("flow", p.L4FlowHash()),
)
defer zap.L().Debug("Finished Processing UDP application packet ",
zap.String("flow", p.L4FlowHash()),
zap.Error(err),
)
}
// First retrieve the connection state.
conn, err = d.appUDPRetrieveState(p)
if err != nil {
zap.L().Debug("Connection not found", zap.Error(err))
return nil, fmt.Errorf("Received packet from unenforced process: %s", err)
}
// We are processing only one packet from a given connection at a time.
conn.Lock()
defer conn.Unlock()
// do some pre processing.
if d.service != nil {
// PreProcessServiceInterface
if !d.service.PreProcessUDPAppPacket(p, conn.Context, conn, packet.UDPSynMask) {
p.Print(packet.PacketFailureService)
return nil, fmt.Errorf("pre service processing failed for UDP application packet")
}
}
triggerControlProtocol := false
switch conn.GetState() {
case connection.UDPStart:
// Queue the packet. We will send it after we authorize the session.
if err = conn.QueuePackets(p); err != nil {
// unable to queue packets, perhaps queue is full. if start
// machine is still in start state, we can start authorisation
// again. A drop counter is incremented.
zap.L().Debug("udp queue full for connection", zap.String("flow", p.L4FlowHash()))
}
// Set the state indicating that we send out a Syn packet
conn.SetState(connection.UDPClientSendSyn)
// Drop the packet. We stored it in the queue.
triggerControlProtocol = true
case connection.UDPReceiverProcessedAck, connection.UDPClientSendAck, connection.UDPData:
conn.SetState(connection.UDPData)
default:
zap.L().Debug("Packet is added to the queue", zap.String("flow", p.L4FlowHash()))
if err = conn.QueuePackets(p); err != nil {
return conn, fmt.Errorf("Unable to queue packets:%s", err)
}
return conn, fmt.Errorf("Drop in nfq - buffered")
}
if d.service != nil {
// PostProcessServiceInterface
if !d.service.PostProcessUDPAppPacket(p, nil, conn.Context, conn) {
p.Print(packet.PacketFailureService)
return conn, fmt.Errorf("Encryption failed for application packet")
}
}
if triggerControlProtocol {
err = d.triggerNegotiation(p, conn.Context, conn)
if err != nil {
return conn, err
}
return conn, fmt.Errorf("Drop in nfq - buffered")
}
return conn, nil
} | go | func (d *Datapath) ProcessApplicationUDPPacket(p *packet.Packet) (conn *connection.UDPConnection, err error) {
if d.packetLogs {
zap.L().Debug("Processing application UDP packet ",
zap.String("flow", p.L4FlowHash()),
)
defer zap.L().Debug("Finished Processing UDP application packet ",
zap.String("flow", p.L4FlowHash()),
zap.Error(err),
)
}
// First retrieve the connection state.
conn, err = d.appUDPRetrieveState(p)
if err != nil {
zap.L().Debug("Connection not found", zap.Error(err))
return nil, fmt.Errorf("Received packet from unenforced process: %s", err)
}
// We are processing only one packet from a given connection at a time.
conn.Lock()
defer conn.Unlock()
// do some pre processing.
if d.service != nil {
// PreProcessServiceInterface
if !d.service.PreProcessUDPAppPacket(p, conn.Context, conn, packet.UDPSynMask) {
p.Print(packet.PacketFailureService)
return nil, fmt.Errorf("pre service processing failed for UDP application packet")
}
}
triggerControlProtocol := false
switch conn.GetState() {
case connection.UDPStart:
// Queue the packet. We will send it after we authorize the session.
if err = conn.QueuePackets(p); err != nil {
// unable to queue packets, perhaps queue is full. if start
// machine is still in start state, we can start authorisation
// again. A drop counter is incremented.
zap.L().Debug("udp queue full for connection", zap.String("flow", p.L4FlowHash()))
}
// Set the state indicating that we send out a Syn packet
conn.SetState(connection.UDPClientSendSyn)
// Drop the packet. We stored it in the queue.
triggerControlProtocol = true
case connection.UDPReceiverProcessedAck, connection.UDPClientSendAck, connection.UDPData:
conn.SetState(connection.UDPData)
default:
zap.L().Debug("Packet is added to the queue", zap.String("flow", p.L4FlowHash()))
if err = conn.QueuePackets(p); err != nil {
return conn, fmt.Errorf("Unable to queue packets:%s", err)
}
return conn, fmt.Errorf("Drop in nfq - buffered")
}
if d.service != nil {
// PostProcessServiceInterface
if !d.service.PostProcessUDPAppPacket(p, nil, conn.Context, conn) {
p.Print(packet.PacketFailureService)
return conn, fmt.Errorf("Encryption failed for application packet")
}
}
if triggerControlProtocol {
err = d.triggerNegotiation(p, conn.Context, conn)
if err != nil {
return conn, err
}
return conn, fmt.Errorf("Drop in nfq - buffered")
}
return conn, nil
} | [
"func",
"(",
"d",
"*",
"Datapath",
")",
"ProcessApplicationUDPPacket",
"(",
"p",
"*",
"packet",
".",
"Packet",
")",
"(",
"conn",
"*",
"connection",
".",
"UDPConnection",
",",
"err",
"error",
")",
"{",
"if",
"d",
".",
"packetLogs",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"p",
".",
"L4FlowHash",
"(",
")",
")",
",",
")",
"\n",
"defer",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"p",
".",
"L4FlowHash",
"(",
")",
")",
",",
"zap",
".",
"Error",
"(",
"err",
")",
",",
")",
"\n",
"}",
"\n",
"// First retrieve the connection state.",
"conn",
",",
"err",
"=",
"d",
".",
"appUDPRetrieveState",
"(",
"p",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"// We are processing only one packet from a given connection at a time.",
"conn",
".",
"Lock",
"(",
")",
"\n",
"defer",
"conn",
".",
"Unlock",
"(",
")",
"\n\n",
"// do some pre processing.",
"if",
"d",
".",
"service",
"!=",
"nil",
"{",
"// PreProcessServiceInterface",
"if",
"!",
"d",
".",
"service",
".",
"PreProcessUDPAppPacket",
"(",
"p",
",",
"conn",
".",
"Context",
",",
"conn",
",",
"packet",
".",
"UDPSynMask",
")",
"{",
"p",
".",
"Print",
"(",
"packet",
".",
"PacketFailureService",
")",
"\n",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"triggerControlProtocol",
":=",
"false",
"\n",
"switch",
"conn",
".",
"GetState",
"(",
")",
"{",
"case",
"connection",
".",
"UDPStart",
":",
"// Queue the packet. We will send it after we authorize the session.",
"if",
"err",
"=",
"conn",
".",
"QueuePackets",
"(",
"p",
")",
";",
"err",
"!=",
"nil",
"{",
"// unable to queue packets, perhaps queue is full. if start",
"// machine is still in start state, we can start authorisation",
"// again. A drop counter is incremented.",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"p",
".",
"L4FlowHash",
"(",
")",
")",
")",
"\n",
"}",
"\n\n",
"// Set the state indicating that we send out a Syn packet",
"conn",
".",
"SetState",
"(",
"connection",
".",
"UDPClientSendSyn",
")",
"\n",
"// Drop the packet. We stored it in the queue.",
"triggerControlProtocol",
"=",
"true",
"\n\n",
"case",
"connection",
".",
"UDPReceiverProcessedAck",
",",
"connection",
".",
"UDPClientSendAck",
",",
"connection",
".",
"UDPData",
":",
"conn",
".",
"SetState",
"(",
"connection",
".",
"UDPData",
")",
"\n\n",
"default",
":",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"p",
".",
"L4FlowHash",
"(",
")",
")",
")",
"\n",
"if",
"err",
"=",
"conn",
".",
"QueuePackets",
"(",
"p",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"conn",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"return",
"conn",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"if",
"d",
".",
"service",
"!=",
"nil",
"{",
"// PostProcessServiceInterface",
"if",
"!",
"d",
".",
"service",
".",
"PostProcessUDPAppPacket",
"(",
"p",
",",
"nil",
",",
"conn",
".",
"Context",
",",
"conn",
")",
"{",
"p",
".",
"Print",
"(",
"packet",
".",
"PacketFailureService",
")",
"\n",
"return",
"conn",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"triggerControlProtocol",
"{",
"err",
"=",
"d",
".",
"triggerNegotiation",
"(",
"p",
",",
"conn",
".",
"Context",
",",
"conn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"conn",
",",
"err",
"\n",
"}",
"\n",
"return",
"conn",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"conn",
",",
"nil",
"\n",
"}"
] | // ProcessApplicationUDPPacket processes packets arriving from an application and are destined to the network | [
"ProcessApplicationUDPPacket",
"processes",
"packets",
"arriving",
"from",
"an",
"application",
"and",
"are",
"destined",
"to",
"the",
"network"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/nfqdatapath/datapath_udp.go#L269-L344 |
6,830 | aporeto-inc/trireme-lib | controller/internal/enforcer/nfqdatapath/datapath_udp.go | triggerNegotiation | func (d *Datapath) triggerNegotiation(udpPacket *packet.Packet, context *pucontext.PUContext, conn *connection.UDPConnection) (err error) {
udpOptions := packet.CreateUDPAuthMarker(packet.UDPSynMask)
udpData, err := d.tokenAccessor.CreateSynPacketToken(context, &conn.Auth)
if err != nil {
return err
}
newPacket, err := d.clonePacketHeaders(udpPacket)
if err != nil {
return fmt.Errorf("Unable to clone packet: %s", err)
}
// Attach the UDP data and token
newPacket.UDPTokenAttach(udpOptions, udpData)
// send packet
err = d.writeWithRetransmit(newPacket.GetBuffer(0), conn, conn.SynChannel())
if err != nil {
zap.L().Error("Unable to send syn token on raw socket", zap.Error(err))
return fmt.Errorf("unable to transmit syn packet")
}
// Populate the caches to track the connection
hash := udpPacket.L4FlowHash()
d.udpAppOrigConnectionTracker.AddOrUpdate(hash, conn)
d.udpSourcePortConnectionCache.AddOrUpdate(newPacket.SourcePortHash(packet.PacketTypeApplication), conn)
d.udpNatConnectionTracker.AddOrUpdate(newPacket.SourcePortHash(packet.PacketTypeApplication), newPacket.SourcePortHash(packet.PacketTypeNetwork))
return nil
} | go | func (d *Datapath) triggerNegotiation(udpPacket *packet.Packet, context *pucontext.PUContext, conn *connection.UDPConnection) (err error) {
udpOptions := packet.CreateUDPAuthMarker(packet.UDPSynMask)
udpData, err := d.tokenAccessor.CreateSynPacketToken(context, &conn.Auth)
if err != nil {
return err
}
newPacket, err := d.clonePacketHeaders(udpPacket)
if err != nil {
return fmt.Errorf("Unable to clone packet: %s", err)
}
// Attach the UDP data and token
newPacket.UDPTokenAttach(udpOptions, udpData)
// send packet
err = d.writeWithRetransmit(newPacket.GetBuffer(0), conn, conn.SynChannel())
if err != nil {
zap.L().Error("Unable to send syn token on raw socket", zap.Error(err))
return fmt.Errorf("unable to transmit syn packet")
}
// Populate the caches to track the connection
hash := udpPacket.L4FlowHash()
d.udpAppOrigConnectionTracker.AddOrUpdate(hash, conn)
d.udpSourcePortConnectionCache.AddOrUpdate(newPacket.SourcePortHash(packet.PacketTypeApplication), conn)
d.udpNatConnectionTracker.AddOrUpdate(newPacket.SourcePortHash(packet.PacketTypeApplication), newPacket.SourcePortHash(packet.PacketTypeNetwork))
return nil
} | [
"func",
"(",
"d",
"*",
"Datapath",
")",
"triggerNegotiation",
"(",
"udpPacket",
"*",
"packet",
".",
"Packet",
",",
"context",
"*",
"pucontext",
".",
"PUContext",
",",
"conn",
"*",
"connection",
".",
"UDPConnection",
")",
"(",
"err",
"error",
")",
"{",
"udpOptions",
":=",
"packet",
".",
"CreateUDPAuthMarker",
"(",
"packet",
".",
"UDPSynMask",
")",
"\n\n",
"udpData",
",",
"err",
":=",
"d",
".",
"tokenAccessor",
".",
"CreateSynPacketToken",
"(",
"context",
",",
"&",
"conn",
".",
"Auth",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"newPacket",
",",
"err",
":=",
"d",
".",
"clonePacketHeaders",
"(",
"udpPacket",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"// Attach the UDP data and token",
"newPacket",
".",
"UDPTokenAttach",
"(",
"udpOptions",
",",
"udpData",
")",
"\n\n",
"// send packet",
"err",
"=",
"d",
".",
"writeWithRetransmit",
"(",
"newPacket",
".",
"GetBuffer",
"(",
"0",
")",
",",
"conn",
",",
"conn",
".",
"SynChannel",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// Populate the caches to track the connection",
"hash",
":=",
"udpPacket",
".",
"L4FlowHash",
"(",
")",
"\n",
"d",
".",
"udpAppOrigConnectionTracker",
".",
"AddOrUpdate",
"(",
"hash",
",",
"conn",
")",
"\n",
"d",
".",
"udpSourcePortConnectionCache",
".",
"AddOrUpdate",
"(",
"newPacket",
".",
"SourcePortHash",
"(",
"packet",
".",
"PacketTypeApplication",
")",
",",
"conn",
")",
"\n",
"d",
".",
"udpNatConnectionTracker",
".",
"AddOrUpdate",
"(",
"newPacket",
".",
"SourcePortHash",
"(",
"packet",
".",
"PacketTypeApplication",
")",
",",
"newPacket",
".",
"SourcePortHash",
"(",
"packet",
".",
"PacketTypeNetwork",
")",
")",
"\n\n",
"return",
"nil",
"\n\n",
"}"
] | // processApplicationUDPSynPacket processes a single Syn Packet | [
"processApplicationUDPSynPacket",
"processes",
"a",
"single",
"Syn",
"Packet"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/nfqdatapath/datapath_udp.go#L367-L398 |
6,831 | aporeto-inc/trireme-lib | controller/internal/enforcer/nfqdatapath/datapath_udp.go | sendUDPSynAckPacket | func (d *Datapath) sendUDPSynAckPacket(udpPacket *packet.Packet, context *pucontext.PUContext, conn *connection.UDPConnection) (err error) {
// Create UDP Option
udpOptions := packet.CreateUDPAuthMarker(packet.UDPSynAckMask)
udpData, err := d.tokenAccessor.CreateSynAckPacketToken(context, &conn.Auth, claimsheader.NewClaimsHeader())
if err != nil {
return err
}
udpPacket.CreateReverseFlowPacket(udpPacket.SourceAddress(), udpPacket.SourcePort())
// Attach the UDP data and token
udpPacket.UDPTokenAttach(udpOptions, udpData)
// If we have already a backgroun re-transmit session, stop it at this point. We will
// start from the beginning.
if conn.GetState() == connection.UDPReceiverSendSynAck {
conn.SynAckStop()
}
// Only start the retransmission timer once. Not on every packet.
if err := d.writeWithRetransmit(udpPacket.GetBuffer(0), conn, conn.SynAckChannel()); err != nil {
zap.L().Debug("Unable to send synack token on raw socket", zap.Error(err))
return err
}
return nil
} | go | func (d *Datapath) sendUDPSynAckPacket(udpPacket *packet.Packet, context *pucontext.PUContext, conn *connection.UDPConnection) (err error) {
// Create UDP Option
udpOptions := packet.CreateUDPAuthMarker(packet.UDPSynAckMask)
udpData, err := d.tokenAccessor.CreateSynAckPacketToken(context, &conn.Auth, claimsheader.NewClaimsHeader())
if err != nil {
return err
}
udpPacket.CreateReverseFlowPacket(udpPacket.SourceAddress(), udpPacket.SourcePort())
// Attach the UDP data and token
udpPacket.UDPTokenAttach(udpOptions, udpData)
// If we have already a backgroun re-transmit session, stop it at this point. We will
// start from the beginning.
if conn.GetState() == connection.UDPReceiverSendSynAck {
conn.SynAckStop()
}
// Only start the retransmission timer once. Not on every packet.
if err := d.writeWithRetransmit(udpPacket.GetBuffer(0), conn, conn.SynAckChannel()); err != nil {
zap.L().Debug("Unable to send synack token on raw socket", zap.Error(err))
return err
}
return nil
} | [
"func",
"(",
"d",
"*",
"Datapath",
")",
"sendUDPSynAckPacket",
"(",
"udpPacket",
"*",
"packet",
".",
"Packet",
",",
"context",
"*",
"pucontext",
".",
"PUContext",
",",
"conn",
"*",
"connection",
".",
"UDPConnection",
")",
"(",
"err",
"error",
")",
"{",
"// Create UDP Option",
"udpOptions",
":=",
"packet",
".",
"CreateUDPAuthMarker",
"(",
"packet",
".",
"UDPSynAckMask",
")",
"\n\n",
"udpData",
",",
"err",
":=",
"d",
".",
"tokenAccessor",
".",
"CreateSynAckPacketToken",
"(",
"context",
",",
"&",
"conn",
".",
"Auth",
",",
"claimsheader",
".",
"NewClaimsHeader",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"udpPacket",
".",
"CreateReverseFlowPacket",
"(",
"udpPacket",
".",
"SourceAddress",
"(",
")",
",",
"udpPacket",
".",
"SourcePort",
"(",
")",
")",
"\n\n",
"// Attach the UDP data and token",
"udpPacket",
".",
"UDPTokenAttach",
"(",
"udpOptions",
",",
"udpData",
")",
"\n\n",
"// If we have already a backgroun re-transmit session, stop it at this point. We will",
"// start from the beginning.",
"if",
"conn",
".",
"GetState",
"(",
")",
"==",
"connection",
".",
"UDPReceiverSendSynAck",
"{",
"conn",
".",
"SynAckStop",
"(",
")",
"\n",
"}",
"\n\n",
"// Only start the retransmission timer once. Not on every packet.",
"if",
"err",
":=",
"d",
".",
"writeWithRetransmit",
"(",
"udpPacket",
".",
"GetBuffer",
"(",
"0",
")",
",",
"conn",
",",
"conn",
".",
"SynAckChannel",
"(",
")",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"return",
"err",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // sendUDPSynAckPacket processes a UDP SynAck packet | [
"sendUDPSynAckPacket",
"processes",
"a",
"UDP",
"SynAck",
"packet"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/nfqdatapath/datapath_udp.go#L443-L471 |
6,832 | aporeto-inc/trireme-lib | controller/internal/enforcer/nfqdatapath/datapath_udp.go | processNetworkUDPSynPacket | func (d *Datapath) processNetworkUDPSynPacket(context *pucontext.PUContext, conn *connection.UDPConnection, udpPacket *packet.Packet) (action interface{}, claims *tokens.ConnectionClaims, err error) {
claims, err = d.tokenAccessor.ParsePacketToken(&conn.Auth, udpPacket.ReadUDPToken())
if err != nil {
d.reportUDPRejectedFlow(udpPacket, conn, collector.DefaultEndPoint, context.ManagementID(), context, tokens.CodeFromErr(err), nil, nil, false)
return nil, nil, fmt.Errorf("UDP Syn packet dropped because of invalid token: %s", err)
}
// if there are no claims we must drop the connection and we drop the Syn
// packet. The source will retry but we have no state to maintain here.
if claims == nil {
d.reportUDPRejectedFlow(udpPacket, conn, collector.DefaultEndPoint, context.ManagementID(), context, collector.InvalidToken, nil, nil, false)
return nil, nil, fmt.Errorf("UDP Syn packet dropped because of no claims")
}
// Why is this required. Take a look.
txLabel, _ := claims.T.Get(enforcerconstants.TransmitterLabel)
// Add the port as a label with an @ prefix. These labels are invalid otherwise
// If all policies are restricted by port numbers this will allow port-specific policies
claims.T.AppendKeyValue(enforcerconstants.PortNumberLabelString, strconv.Itoa(int(udpPacket.DestPort())))
report, pkt := context.SearchRcvRules(claims.T)
if pkt.Action.Rejected() {
d.reportUDPRejectedFlow(udpPacket, conn, txLabel, context.ManagementID(), context, collector.PolicyDrop, report, pkt, false)
return nil, nil, fmt.Errorf("connection rejected because of policy: %s", claims.T.String())
}
hash := udpPacket.L4FlowHash()
// conntrack
d.udpNetOrigConnectionTracker.AddOrUpdate(hash, conn)
d.udpAppReplyConnectionTracker.AddOrUpdate(udpPacket.L4ReverseFlowHash(), conn)
// Record actions
conn.ReportFlowPolicy = report
conn.PacketFlowPolicy = pkt
return pkt, claims, nil
} | go | func (d *Datapath) processNetworkUDPSynPacket(context *pucontext.PUContext, conn *connection.UDPConnection, udpPacket *packet.Packet) (action interface{}, claims *tokens.ConnectionClaims, err error) {
claims, err = d.tokenAccessor.ParsePacketToken(&conn.Auth, udpPacket.ReadUDPToken())
if err != nil {
d.reportUDPRejectedFlow(udpPacket, conn, collector.DefaultEndPoint, context.ManagementID(), context, tokens.CodeFromErr(err), nil, nil, false)
return nil, nil, fmt.Errorf("UDP Syn packet dropped because of invalid token: %s", err)
}
// if there are no claims we must drop the connection and we drop the Syn
// packet. The source will retry but we have no state to maintain here.
if claims == nil {
d.reportUDPRejectedFlow(udpPacket, conn, collector.DefaultEndPoint, context.ManagementID(), context, collector.InvalidToken, nil, nil, false)
return nil, nil, fmt.Errorf("UDP Syn packet dropped because of no claims")
}
// Why is this required. Take a look.
txLabel, _ := claims.T.Get(enforcerconstants.TransmitterLabel)
// Add the port as a label with an @ prefix. These labels are invalid otherwise
// If all policies are restricted by port numbers this will allow port-specific policies
claims.T.AppendKeyValue(enforcerconstants.PortNumberLabelString, strconv.Itoa(int(udpPacket.DestPort())))
report, pkt := context.SearchRcvRules(claims.T)
if pkt.Action.Rejected() {
d.reportUDPRejectedFlow(udpPacket, conn, txLabel, context.ManagementID(), context, collector.PolicyDrop, report, pkt, false)
return nil, nil, fmt.Errorf("connection rejected because of policy: %s", claims.T.String())
}
hash := udpPacket.L4FlowHash()
// conntrack
d.udpNetOrigConnectionTracker.AddOrUpdate(hash, conn)
d.udpAppReplyConnectionTracker.AddOrUpdate(udpPacket.L4ReverseFlowHash(), conn)
// Record actions
conn.ReportFlowPolicy = report
conn.PacketFlowPolicy = pkt
return pkt, claims, nil
} | [
"func",
"(",
"d",
"*",
"Datapath",
")",
"processNetworkUDPSynPacket",
"(",
"context",
"*",
"pucontext",
".",
"PUContext",
",",
"conn",
"*",
"connection",
".",
"UDPConnection",
",",
"udpPacket",
"*",
"packet",
".",
"Packet",
")",
"(",
"action",
"interface",
"{",
"}",
",",
"claims",
"*",
"tokens",
".",
"ConnectionClaims",
",",
"err",
"error",
")",
"{",
"claims",
",",
"err",
"=",
"d",
".",
"tokenAccessor",
".",
"ParsePacketToken",
"(",
"&",
"conn",
".",
"Auth",
",",
"udpPacket",
".",
"ReadUDPToken",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"d",
".",
"reportUDPRejectedFlow",
"(",
"udpPacket",
",",
"conn",
",",
"collector",
".",
"DefaultEndPoint",
",",
"context",
".",
"ManagementID",
"(",
")",
",",
"context",
",",
"tokens",
".",
"CodeFromErr",
"(",
"err",
")",
",",
"nil",
",",
"nil",
",",
"false",
")",
"\n",
"return",
"nil",
",",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"// if there are no claims we must drop the connection and we drop the Syn",
"// packet. The source will retry but we have no state to maintain here.",
"if",
"claims",
"==",
"nil",
"{",
"d",
".",
"reportUDPRejectedFlow",
"(",
"udpPacket",
",",
"conn",
",",
"collector",
".",
"DefaultEndPoint",
",",
"context",
".",
"ManagementID",
"(",
")",
",",
"context",
",",
"collector",
".",
"InvalidToken",
",",
"nil",
",",
"nil",
",",
"false",
")",
"\n",
"return",
"nil",
",",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// Why is this required. Take a look.",
"txLabel",
",",
"_",
":=",
"claims",
".",
"T",
".",
"Get",
"(",
"enforcerconstants",
".",
"TransmitterLabel",
")",
"\n\n",
"// Add the port as a label with an @ prefix. These labels are invalid otherwise",
"// If all policies are restricted by port numbers this will allow port-specific policies",
"claims",
".",
"T",
".",
"AppendKeyValue",
"(",
"enforcerconstants",
".",
"PortNumberLabelString",
",",
"strconv",
".",
"Itoa",
"(",
"int",
"(",
"udpPacket",
".",
"DestPort",
"(",
")",
")",
")",
")",
"\n\n",
"report",
",",
"pkt",
":=",
"context",
".",
"SearchRcvRules",
"(",
"claims",
".",
"T",
")",
"\n",
"if",
"pkt",
".",
"Action",
".",
"Rejected",
"(",
")",
"{",
"d",
".",
"reportUDPRejectedFlow",
"(",
"udpPacket",
",",
"conn",
",",
"txLabel",
",",
"context",
".",
"ManagementID",
"(",
")",
",",
"context",
",",
"collector",
".",
"PolicyDrop",
",",
"report",
",",
"pkt",
",",
"false",
")",
"\n",
"return",
"nil",
",",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"claims",
".",
"T",
".",
"String",
"(",
")",
")",
"\n",
"}",
"\n\n",
"hash",
":=",
"udpPacket",
".",
"L4FlowHash",
"(",
")",
"\n\n",
"// conntrack",
"d",
".",
"udpNetOrigConnectionTracker",
".",
"AddOrUpdate",
"(",
"hash",
",",
"conn",
")",
"\n",
"d",
".",
"udpAppReplyConnectionTracker",
".",
"AddOrUpdate",
"(",
"udpPacket",
".",
"L4ReverseFlowHash",
"(",
")",
",",
"conn",
")",
"\n\n",
"// Record actions",
"conn",
".",
"ReportFlowPolicy",
"=",
"report",
"\n",
"conn",
".",
"PacketFlowPolicy",
"=",
"pkt",
"\n\n",
"return",
"pkt",
",",
"claims",
",",
"nil",
"\n",
"}"
] | // processNetworkUDPSynPacket processes a syn packet arriving from the network | [
"processNetworkUDPSynPacket",
"processes",
"a",
"syn",
"packet",
"arriving",
"from",
"the",
"network"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/nfqdatapath/datapath_udp.go#L537-L576 |
6,833 | aporeto-inc/trireme-lib | controller/internal/enforcer/nfqdatapath/datapath_udp.go | sendUDPFinPacket | func (d *Datapath) sendUDPFinPacket(udpPacket *packet.Packet) (err error) {
// Create UDP Option
udpOptions := packet.CreateUDPAuthMarker(packet.UDPFinAckMask)
udpPacket.CreateReverseFlowPacket(udpPacket.SourceAddress(), udpPacket.SourcePort())
// Attach the UDP data and token
udpPacket.UDPTokenAttach(udpOptions, []byte{})
zap.L().Info("Sending udp fin ack packet", zap.String("packet", udpPacket.L4FlowHash()))
// no need for retransmits here.
err = d.udpSocketWriter.WriteSocket(udpPacket.GetBuffer(0))
if err != nil {
zap.L().Debug("Unable to send fin packet on raw socket", zap.Error(err))
return err
}
return nil
} | go | func (d *Datapath) sendUDPFinPacket(udpPacket *packet.Packet) (err error) {
// Create UDP Option
udpOptions := packet.CreateUDPAuthMarker(packet.UDPFinAckMask)
udpPacket.CreateReverseFlowPacket(udpPacket.SourceAddress(), udpPacket.SourcePort())
// Attach the UDP data and token
udpPacket.UDPTokenAttach(udpOptions, []byte{})
zap.L().Info("Sending udp fin ack packet", zap.String("packet", udpPacket.L4FlowHash()))
// no need for retransmits here.
err = d.udpSocketWriter.WriteSocket(udpPacket.GetBuffer(0))
if err != nil {
zap.L().Debug("Unable to send fin packet on raw socket", zap.Error(err))
return err
}
return nil
} | [
"func",
"(",
"d",
"*",
"Datapath",
")",
"sendUDPFinPacket",
"(",
"udpPacket",
"*",
"packet",
".",
"Packet",
")",
"(",
"err",
"error",
")",
"{",
"// Create UDP Option",
"udpOptions",
":=",
"packet",
".",
"CreateUDPAuthMarker",
"(",
"packet",
".",
"UDPFinAckMask",
")",
"\n\n",
"udpPacket",
".",
"CreateReverseFlowPacket",
"(",
"udpPacket",
".",
"SourceAddress",
"(",
")",
",",
"udpPacket",
".",
"SourcePort",
"(",
")",
")",
"\n\n",
"// Attach the UDP data and token",
"udpPacket",
".",
"UDPTokenAttach",
"(",
"udpOptions",
",",
"[",
"]",
"byte",
"{",
"}",
")",
"\n\n",
"zap",
".",
"L",
"(",
")",
".",
"Info",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"udpPacket",
".",
"L4FlowHash",
"(",
")",
")",
")",
"\n",
"// no need for retransmits here.",
"err",
"=",
"d",
".",
"udpSocketWriter",
".",
"WriteSocket",
"(",
"udpPacket",
".",
"GetBuffer",
"(",
"0",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"return",
"err",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // sendUDPFinPacket sends a Fin packet to Peer. | [
"sendUDPFinPacket",
"sends",
"a",
"Fin",
"packet",
"to",
"Peer",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/nfqdatapath/datapath_udp.go#L638-L657 |
6,834 | aporeto-inc/trireme-lib | controller/internal/enforcer/nfqdatapath/datapath_udp.go | processUDPFinPacket | func (d *Datapath) processUDPFinPacket(udpPacket *packet.Packet) (err error) { // nolint
// add it to the udp fin cache. If we have already received the fin packet
// for this flow. There is no need to change the connmark label again.
if d.udpFinPacketTracker.AddOrUpdate(udpPacket.L4ReverseFlowHash(), true) {
return nil
}
// clear cache entries.
if err := d.udpAppOrigConnectionTracker.Remove(udpPacket.L4ReverseFlowHash()); err != nil {
zap.L().Debug("Failed to clean cache udpappOrigConnectionTracker", zap.Error(err))
}
if err := d.udpSourcePortConnectionCache.Remove(udpPacket.SourcePortHash(packet.PacketTypeNetwork)); err != nil {
zap.L().Debug("Failed to clean cache udpsourcePortConnectionCache", zap.Error(err))
}
zap.L().Debug("Updating the connmark label", zap.String("flow", udpPacket.L4FlowHash()))
if err = d.conntrack.UpdateNetworkFlowMark(
udpPacket.SourceAddress(),
udpPacket.DestinationAddress(),
udpPacket.IPProto(),
udpPacket.SourcePort(),
udpPacket.DestPort(),
constants.DeleteConnmark,
); err != nil {
zap.L().Error("Failed to update conntrack table for flow to terminate connection",
zap.String("app-conn", udpPacket.L4FlowHash()),
zap.Error(err),
)
}
return nil
} | go | func (d *Datapath) processUDPFinPacket(udpPacket *packet.Packet) (err error) { // nolint
// add it to the udp fin cache. If we have already received the fin packet
// for this flow. There is no need to change the connmark label again.
if d.udpFinPacketTracker.AddOrUpdate(udpPacket.L4ReverseFlowHash(), true) {
return nil
}
// clear cache entries.
if err := d.udpAppOrigConnectionTracker.Remove(udpPacket.L4ReverseFlowHash()); err != nil {
zap.L().Debug("Failed to clean cache udpappOrigConnectionTracker", zap.Error(err))
}
if err := d.udpSourcePortConnectionCache.Remove(udpPacket.SourcePortHash(packet.PacketTypeNetwork)); err != nil {
zap.L().Debug("Failed to clean cache udpsourcePortConnectionCache", zap.Error(err))
}
zap.L().Debug("Updating the connmark label", zap.String("flow", udpPacket.L4FlowHash()))
if err = d.conntrack.UpdateNetworkFlowMark(
udpPacket.SourceAddress(),
udpPacket.DestinationAddress(),
udpPacket.IPProto(),
udpPacket.SourcePort(),
udpPacket.DestPort(),
constants.DeleteConnmark,
); err != nil {
zap.L().Error("Failed to update conntrack table for flow to terminate connection",
zap.String("app-conn", udpPacket.L4FlowHash()),
zap.Error(err),
)
}
return nil
} | [
"func",
"(",
"d",
"*",
"Datapath",
")",
"processUDPFinPacket",
"(",
"udpPacket",
"*",
"packet",
".",
"Packet",
")",
"(",
"err",
"error",
")",
"{",
"// nolint",
"// add it to the udp fin cache. If we have already received the fin packet",
"// for this flow. There is no need to change the connmark label again.",
"if",
"d",
".",
"udpFinPacketTracker",
".",
"AddOrUpdate",
"(",
"udpPacket",
".",
"L4ReverseFlowHash",
"(",
")",
",",
"true",
")",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"// clear cache entries.",
"if",
"err",
":=",
"d",
".",
"udpAppOrigConnectionTracker",
".",
"Remove",
"(",
"udpPacket",
".",
"L4ReverseFlowHash",
"(",
")",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"d",
".",
"udpSourcePortConnectionCache",
".",
"Remove",
"(",
"udpPacket",
".",
"SourcePortHash",
"(",
"packet",
".",
"PacketTypeNetwork",
")",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n\n",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"udpPacket",
".",
"L4FlowHash",
"(",
")",
")",
")",
"\n",
"if",
"err",
"=",
"d",
".",
"conntrack",
".",
"UpdateNetworkFlowMark",
"(",
"udpPacket",
".",
"SourceAddress",
"(",
")",
",",
"udpPacket",
".",
"DestinationAddress",
"(",
")",
",",
"udpPacket",
".",
"IPProto",
"(",
")",
",",
"udpPacket",
".",
"SourcePort",
"(",
")",
",",
"udpPacket",
".",
"DestPort",
"(",
")",
",",
"constants",
".",
"DeleteConnmark",
",",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"udpPacket",
".",
"L4FlowHash",
"(",
")",
")",
",",
"zap",
".",
"Error",
"(",
"err",
")",
",",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Update the udp fin cache and delete the connmark. | [
"Update",
"the",
"udp",
"fin",
"cache",
"and",
"delete",
"the",
"connmark",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/nfqdatapath/datapath_udp.go#L660-L693 |
6,835 | aporeto-inc/trireme-lib | controller/pkg/remoteenforcer/remoteenforcer_linux.go | newRemoteEnforcer | func newRemoteEnforcer(
ctx context.Context,
cancel context.CancelFunc,
service packetprocessor.PacketProcessor,
rpcHandle rpcwrapper.RPCServer,
secret string,
statsClient statsclient.StatsClient,
collector statscollector.Collector,
debugClient debugclient.DebugClient,
) (*RemoteEnforcer, error) {
var err error
if collector == nil {
collector = statscollector.NewCollector()
}
if statsClient == nil {
statsClient, err = statsclient.NewStatsClient(collector)
if err != nil {
return nil, err
}
}
if debugClient == nil {
debugClient, err = debugclient.NewDebugClient(collector)
if err != nil {
return nil, err
}
}
procMountPoint := os.Getenv(constants.EnvMountPoint)
if procMountPoint == "" {
procMountPoint = constants.DefaultProcMountPoint
}
return &RemoteEnforcer{
collector: collector,
service: service,
rpcSecret: secret,
rpcHandle: rpcHandle,
procMountPoint: procMountPoint,
statsClient: statsClient,
debugClient: debugClient,
ctx: ctx,
cancel: cancel,
exit: make(chan bool),
}, nil
} | go | func newRemoteEnforcer(
ctx context.Context,
cancel context.CancelFunc,
service packetprocessor.PacketProcessor,
rpcHandle rpcwrapper.RPCServer,
secret string,
statsClient statsclient.StatsClient,
collector statscollector.Collector,
debugClient debugclient.DebugClient,
) (*RemoteEnforcer, error) {
var err error
if collector == nil {
collector = statscollector.NewCollector()
}
if statsClient == nil {
statsClient, err = statsclient.NewStatsClient(collector)
if err != nil {
return nil, err
}
}
if debugClient == nil {
debugClient, err = debugclient.NewDebugClient(collector)
if err != nil {
return nil, err
}
}
procMountPoint := os.Getenv(constants.EnvMountPoint)
if procMountPoint == "" {
procMountPoint = constants.DefaultProcMountPoint
}
return &RemoteEnforcer{
collector: collector,
service: service,
rpcSecret: secret,
rpcHandle: rpcHandle,
procMountPoint: procMountPoint,
statsClient: statsClient,
debugClient: debugClient,
ctx: ctx,
cancel: cancel,
exit: make(chan bool),
}, nil
} | [
"func",
"newRemoteEnforcer",
"(",
"ctx",
"context",
".",
"Context",
",",
"cancel",
"context",
".",
"CancelFunc",
",",
"service",
"packetprocessor",
".",
"PacketProcessor",
",",
"rpcHandle",
"rpcwrapper",
".",
"RPCServer",
",",
"secret",
"string",
",",
"statsClient",
"statsclient",
".",
"StatsClient",
",",
"collector",
"statscollector",
".",
"Collector",
",",
"debugClient",
"debugclient",
".",
"DebugClient",
",",
")",
"(",
"*",
"RemoteEnforcer",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n\n",
"if",
"collector",
"==",
"nil",
"{",
"collector",
"=",
"statscollector",
".",
"NewCollector",
"(",
")",
"\n",
"}",
"\n\n",
"if",
"statsClient",
"==",
"nil",
"{",
"statsClient",
",",
"err",
"=",
"statsclient",
".",
"NewStatsClient",
"(",
"collector",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"debugClient",
"==",
"nil",
"{",
"debugClient",
",",
"err",
"=",
"debugclient",
".",
"NewDebugClient",
"(",
"collector",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"procMountPoint",
":=",
"os",
".",
"Getenv",
"(",
"constants",
".",
"EnvMountPoint",
")",
"\n",
"if",
"procMountPoint",
"==",
"\"",
"\"",
"{",
"procMountPoint",
"=",
"constants",
".",
"DefaultProcMountPoint",
"\n",
"}",
"\n\n",
"return",
"&",
"RemoteEnforcer",
"{",
"collector",
":",
"collector",
",",
"service",
":",
"service",
",",
"rpcSecret",
":",
"secret",
",",
"rpcHandle",
":",
"rpcHandle",
",",
"procMountPoint",
":",
"procMountPoint",
",",
"statsClient",
":",
"statsClient",
",",
"debugClient",
":",
"debugClient",
",",
"ctx",
":",
"ctx",
",",
"cancel",
":",
"cancel",
",",
"exit",
":",
"make",
"(",
"chan",
"bool",
")",
",",
"}",
",",
"nil",
"\n",
"}"
] | // newRemoteEnforcer starts a new server | [
"newRemoteEnforcer",
"starts",
"a",
"new",
"server"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/remoteenforcer/remoteenforcer_linux.go#L47-L94 |
6,836 | aporeto-inc/trireme-lib | controller/pkg/remoteenforcer/remoteenforcer_linux.go | Enforce | func (s *RemoteEnforcer) Enforce(req rpcwrapper.Request, resp *rpcwrapper.Response) error {
if !s.rpcHandle.CheckValidity(&req, s.rpcSecret) {
resp.Status = "enforce message auth failed"
return fmt.Errorf(resp.Status)
}
cmdLock.Lock()
defer cmdLock.Unlock()
payload, ok := req.Payload.(rpcwrapper.EnforcePayload)
if !ok {
resp.Status = "invalid enforcer payload"
return fmt.Errorf(resp.Status)
}
plc, err := payload.Policy.ToPrivatePolicy(true)
if err != nil {
return err
}
puInfo := &policy.PUInfo{
ContextID: payload.ContextID,
Policy: plc,
Runtime: policy.NewPURuntimeWithDefaults(),
}
if s.enforcer == nil || s.supervisor == nil {
resp.Status = "enforcer not initialized - cannot enforce"
return fmt.Errorf(resp.Status)
}
// If any error happens, cleanup everything on exit so that we can recover
// by launcing a new remote.
defer func() {
if err != nil {
s.cleanup()
}
}()
if err = s.supervisor.Supervise(payload.ContextID, puInfo); err != nil {
resp.Status = err.Error()
return err
}
if err = s.enforcer.Enforce(payload.ContextID, puInfo); err != nil {
resp.Status = err.Error()
return err
}
resp.Status = ""
return nil
} | go | func (s *RemoteEnforcer) Enforce(req rpcwrapper.Request, resp *rpcwrapper.Response) error {
if !s.rpcHandle.CheckValidity(&req, s.rpcSecret) {
resp.Status = "enforce message auth failed"
return fmt.Errorf(resp.Status)
}
cmdLock.Lock()
defer cmdLock.Unlock()
payload, ok := req.Payload.(rpcwrapper.EnforcePayload)
if !ok {
resp.Status = "invalid enforcer payload"
return fmt.Errorf(resp.Status)
}
plc, err := payload.Policy.ToPrivatePolicy(true)
if err != nil {
return err
}
puInfo := &policy.PUInfo{
ContextID: payload.ContextID,
Policy: plc,
Runtime: policy.NewPURuntimeWithDefaults(),
}
if s.enforcer == nil || s.supervisor == nil {
resp.Status = "enforcer not initialized - cannot enforce"
return fmt.Errorf(resp.Status)
}
// If any error happens, cleanup everything on exit so that we can recover
// by launcing a new remote.
defer func() {
if err != nil {
s.cleanup()
}
}()
if err = s.supervisor.Supervise(payload.ContextID, puInfo); err != nil {
resp.Status = err.Error()
return err
}
if err = s.enforcer.Enforce(payload.ContextID, puInfo); err != nil {
resp.Status = err.Error()
return err
}
resp.Status = ""
return nil
} | [
"func",
"(",
"s",
"*",
"RemoteEnforcer",
")",
"Enforce",
"(",
"req",
"rpcwrapper",
".",
"Request",
",",
"resp",
"*",
"rpcwrapper",
".",
"Response",
")",
"error",
"{",
"if",
"!",
"s",
".",
"rpcHandle",
".",
"CheckValidity",
"(",
"&",
"req",
",",
"s",
".",
"rpcSecret",
")",
"{",
"resp",
".",
"Status",
"=",
"\"",
"\"",
"\n",
"return",
"fmt",
".",
"Errorf",
"(",
"resp",
".",
"Status",
")",
"\n",
"}",
"\n\n",
"cmdLock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"cmdLock",
".",
"Unlock",
"(",
")",
"\n\n",
"payload",
",",
"ok",
":=",
"req",
".",
"Payload",
".",
"(",
"rpcwrapper",
".",
"EnforcePayload",
")",
"\n",
"if",
"!",
"ok",
"{",
"resp",
".",
"Status",
"=",
"\"",
"\"",
"\n",
"return",
"fmt",
".",
"Errorf",
"(",
"resp",
".",
"Status",
")",
"\n",
"}",
"\n\n",
"plc",
",",
"err",
":=",
"payload",
".",
"Policy",
".",
"ToPrivatePolicy",
"(",
"true",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"puInfo",
":=",
"&",
"policy",
".",
"PUInfo",
"{",
"ContextID",
":",
"payload",
".",
"ContextID",
",",
"Policy",
":",
"plc",
",",
"Runtime",
":",
"policy",
".",
"NewPURuntimeWithDefaults",
"(",
")",
",",
"}",
"\n\n",
"if",
"s",
".",
"enforcer",
"==",
"nil",
"||",
"s",
".",
"supervisor",
"==",
"nil",
"{",
"resp",
".",
"Status",
"=",
"\"",
"\"",
"\n",
"return",
"fmt",
".",
"Errorf",
"(",
"resp",
".",
"Status",
")",
"\n",
"}",
"\n\n",
"// If any error happens, cleanup everything on exit so that we can recover",
"// by launcing a new remote.",
"defer",
"func",
"(",
")",
"{",
"if",
"err",
"!=",
"nil",
"{",
"s",
".",
"cleanup",
"(",
")",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n\n",
"if",
"err",
"=",
"s",
".",
"supervisor",
".",
"Supervise",
"(",
"payload",
".",
"ContextID",
",",
"puInfo",
")",
";",
"err",
"!=",
"nil",
"{",
"resp",
".",
"Status",
"=",
"err",
".",
"Error",
"(",
")",
"\n",
"return",
"err",
"\n",
"}",
"\n\n",
"if",
"err",
"=",
"s",
".",
"enforcer",
".",
"Enforce",
"(",
"payload",
".",
"ContextID",
",",
"puInfo",
")",
";",
"err",
"!=",
"nil",
"{",
"resp",
".",
"Status",
"=",
"err",
".",
"Error",
"(",
")",
"\n",
"return",
"err",
"\n",
"}",
"\n\n",
"resp",
".",
"Status",
"=",
"\"",
"\"",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Enforce this method calls the enforce method on the enforcer created during initenforcer | [
"Enforce",
"this",
"method",
"calls",
"the",
"enforce",
"method",
"on",
"the",
"enforcer",
"created",
"during",
"initenforcer"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/remoteenforcer/remoteenforcer_linux.go#L165-L218 |
6,837 | aporeto-inc/trireme-lib | controller/pkg/remoteenforcer/remoteenforcer_linux.go | Unenforce | func (s *RemoteEnforcer) Unenforce(req rpcwrapper.Request, resp *rpcwrapper.Response) error {
if !s.rpcHandle.CheckValidity(&req, s.rpcSecret) {
resp.Status = "unenforce message auth failed"
return fmt.Errorf(resp.Status)
}
cmdLock.Lock()
defer cmdLock.Unlock()
s.statsClient.SendStats()
payload, ok := req.Payload.(rpcwrapper.UnEnforcePayload)
if !ok {
resp.Status = "invalid unenforcer payload"
return fmt.Errorf(resp.Status)
}
var err error
// If any error happens, cleanup everything on exit so that we can recover
// by launcing a new remote.
defer func() {
if err != nil {
s.cleanup()
}
}()
if err = s.supervisor.Unsupervise(payload.ContextID); err != nil {
resp.Status = err.Error()
return fmt.Errorf("unable to clean supervisor: %s", err)
}
if err = s.enforcer.Unenforce(payload.ContextID); err != nil {
resp.Status = err.Error()
return fmt.Errorf("unable to stop enforcer: %s", err)
}
return nil
} | go | func (s *RemoteEnforcer) Unenforce(req rpcwrapper.Request, resp *rpcwrapper.Response) error {
if !s.rpcHandle.CheckValidity(&req, s.rpcSecret) {
resp.Status = "unenforce message auth failed"
return fmt.Errorf(resp.Status)
}
cmdLock.Lock()
defer cmdLock.Unlock()
s.statsClient.SendStats()
payload, ok := req.Payload.(rpcwrapper.UnEnforcePayload)
if !ok {
resp.Status = "invalid unenforcer payload"
return fmt.Errorf(resp.Status)
}
var err error
// If any error happens, cleanup everything on exit so that we can recover
// by launcing a new remote.
defer func() {
if err != nil {
s.cleanup()
}
}()
if err = s.supervisor.Unsupervise(payload.ContextID); err != nil {
resp.Status = err.Error()
return fmt.Errorf("unable to clean supervisor: %s", err)
}
if err = s.enforcer.Unenforce(payload.ContextID); err != nil {
resp.Status = err.Error()
return fmt.Errorf("unable to stop enforcer: %s", err)
}
return nil
} | [
"func",
"(",
"s",
"*",
"RemoteEnforcer",
")",
"Unenforce",
"(",
"req",
"rpcwrapper",
".",
"Request",
",",
"resp",
"*",
"rpcwrapper",
".",
"Response",
")",
"error",
"{",
"if",
"!",
"s",
".",
"rpcHandle",
".",
"CheckValidity",
"(",
"&",
"req",
",",
"s",
".",
"rpcSecret",
")",
"{",
"resp",
".",
"Status",
"=",
"\"",
"\"",
"\n",
"return",
"fmt",
".",
"Errorf",
"(",
"resp",
".",
"Status",
")",
"\n",
"}",
"\n\n",
"cmdLock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"cmdLock",
".",
"Unlock",
"(",
")",
"\n\n",
"s",
".",
"statsClient",
".",
"SendStats",
"(",
")",
"\n\n",
"payload",
",",
"ok",
":=",
"req",
".",
"Payload",
".",
"(",
"rpcwrapper",
".",
"UnEnforcePayload",
")",
"\n",
"if",
"!",
"ok",
"{",
"resp",
".",
"Status",
"=",
"\"",
"\"",
"\n",
"return",
"fmt",
".",
"Errorf",
"(",
"resp",
".",
"Status",
")",
"\n",
"}",
"\n\n",
"var",
"err",
"error",
"\n\n",
"// If any error happens, cleanup everything on exit so that we can recover",
"// by launcing a new remote.",
"defer",
"func",
"(",
")",
"{",
"if",
"err",
"!=",
"nil",
"{",
"s",
".",
"cleanup",
"(",
")",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n\n",
"if",
"err",
"=",
"s",
".",
"supervisor",
".",
"Unsupervise",
"(",
"payload",
".",
"ContextID",
")",
";",
"err",
"!=",
"nil",
"{",
"resp",
".",
"Status",
"=",
"err",
".",
"Error",
"(",
")",
"\n",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"err",
"=",
"s",
".",
"enforcer",
".",
"Unenforce",
"(",
"payload",
".",
"ContextID",
")",
";",
"err",
"!=",
"nil",
"{",
"resp",
".",
"Status",
"=",
"err",
".",
"Error",
"(",
")",
"\n",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Unenforce this method calls the unenforce method on the enforcer created from initenforcer | [
"Unenforce",
"this",
"method",
"calls",
"the",
"unenforce",
"method",
"on",
"the",
"enforcer",
"created",
"from",
"initenforcer"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/remoteenforcer/remoteenforcer_linux.go#L221-L260 |
6,838 | aporeto-inc/trireme-lib | controller/pkg/remoteenforcer/remoteenforcer_linux.go | SetTargetNetworks | func (s *RemoteEnforcer) SetTargetNetworks(req rpcwrapper.Request, resp *rpcwrapper.Response) error {
var err error
if !s.rpcHandle.CheckValidity(&req, s.rpcSecret) {
resp.Status = "SetTargetNetworks message auth failed" //nolint
return fmt.Errorf(resp.Status)
}
cmdLock.Lock()
defer cmdLock.Unlock()
if s.enforcer == nil || s.supervisor == nil {
return fmt.Errorf(resp.Status)
}
payload := req.Payload.(rpcwrapper.SetTargetNetworksPayload)
// If any error happens, cleanup everything on exit so that we can recover
// by launcing a new remote.
defer func() {
if err != nil {
s.cleanup()
}
}()
if err = s.enforcer.SetTargetNetworks(payload.Configuration); err != nil {
return err
}
err = s.supervisor.SetTargetNetworks(payload.Configuration)
return err
} | go | func (s *RemoteEnforcer) SetTargetNetworks(req rpcwrapper.Request, resp *rpcwrapper.Response) error {
var err error
if !s.rpcHandle.CheckValidity(&req, s.rpcSecret) {
resp.Status = "SetTargetNetworks message auth failed" //nolint
return fmt.Errorf(resp.Status)
}
cmdLock.Lock()
defer cmdLock.Unlock()
if s.enforcer == nil || s.supervisor == nil {
return fmt.Errorf(resp.Status)
}
payload := req.Payload.(rpcwrapper.SetTargetNetworksPayload)
// If any error happens, cleanup everything on exit so that we can recover
// by launcing a new remote.
defer func() {
if err != nil {
s.cleanup()
}
}()
if err = s.enforcer.SetTargetNetworks(payload.Configuration); err != nil {
return err
}
err = s.supervisor.SetTargetNetworks(payload.Configuration)
return err
} | [
"func",
"(",
"s",
"*",
"RemoteEnforcer",
")",
"SetTargetNetworks",
"(",
"req",
"rpcwrapper",
".",
"Request",
",",
"resp",
"*",
"rpcwrapper",
".",
"Response",
")",
"error",
"{",
"var",
"err",
"error",
"\n",
"if",
"!",
"s",
".",
"rpcHandle",
".",
"CheckValidity",
"(",
"&",
"req",
",",
"s",
".",
"rpcSecret",
")",
"{",
"resp",
".",
"Status",
"=",
"\"",
"\"",
"//nolint",
"\n",
"return",
"fmt",
".",
"Errorf",
"(",
"resp",
".",
"Status",
")",
"\n",
"}",
"\n\n",
"cmdLock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"cmdLock",
".",
"Unlock",
"(",
")",
"\n\n",
"if",
"s",
".",
"enforcer",
"==",
"nil",
"||",
"s",
".",
"supervisor",
"==",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"resp",
".",
"Status",
")",
"\n",
"}",
"\n\n",
"payload",
":=",
"req",
".",
"Payload",
".",
"(",
"rpcwrapper",
".",
"SetTargetNetworksPayload",
")",
"\n\n",
"// If any error happens, cleanup everything on exit so that we can recover",
"// by launcing a new remote.",
"defer",
"func",
"(",
")",
"{",
"if",
"err",
"!=",
"nil",
"{",
"s",
".",
"cleanup",
"(",
")",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n\n",
"if",
"err",
"=",
"s",
".",
"enforcer",
".",
"SetTargetNetworks",
"(",
"payload",
".",
"Configuration",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"err",
"=",
"s",
".",
"supervisor",
".",
"SetTargetNetworks",
"(",
"payload",
".",
"Configuration",
")",
"\n\n",
"return",
"err",
"\n",
"}"
] | // SetTargetNetworks calls the same method on the actual enforcer | [
"SetTargetNetworks",
"calls",
"the",
"same",
"method",
"on",
"the",
"actual",
"enforcer"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/remoteenforcer/remoteenforcer_linux.go#L263-L295 |
6,839 | aporeto-inc/trireme-lib | controller/pkg/remoteenforcer/remoteenforcer_linux.go | EnforcerExit | func (s *RemoteEnforcer) EnforcerExit(req rpcwrapper.Request, resp *rpcwrapper.Response) error {
s.cleanup()
s.exit <- true
return nil
} | go | func (s *RemoteEnforcer) EnforcerExit(req rpcwrapper.Request, resp *rpcwrapper.Response) error {
s.cleanup()
s.exit <- true
return nil
} | [
"func",
"(",
"s",
"*",
"RemoteEnforcer",
")",
"EnforcerExit",
"(",
"req",
"rpcwrapper",
".",
"Request",
",",
"resp",
"*",
"rpcwrapper",
".",
"Response",
")",
"error",
"{",
"s",
".",
"cleanup",
"(",
")",
"\n\n",
"s",
".",
"exit",
"<-",
"true",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // EnforcerExit is processing messages from the remote that are requesting an exit. In this
// case we simply cancel the context. | [
"EnforcerExit",
"is",
"processing",
"messages",
"from",
"the",
"remote",
"that",
"are",
"requesting",
"an",
"exit",
".",
"In",
"this",
"case",
"we",
"simply",
"cancel",
"the",
"context",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/remoteenforcer/remoteenforcer_linux.go#L299-L306 |
6,840 | aporeto-inc/trireme-lib | controller/pkg/remoteenforcer/remoteenforcer_linux.go | UpdateSecrets | func (s *RemoteEnforcer) UpdateSecrets(req rpcwrapper.Request, resp *rpcwrapper.Response) error {
var err error
if !s.rpcHandle.CheckValidity(&req, s.rpcSecret) {
resp.Status = "updatesecrets auth failed"
return fmt.Errorf(resp.Status)
}
cmdLock.Lock()
defer cmdLock.Unlock()
if s.enforcer == nil {
return fmt.Errorf(resp.Status)
}
// If any error happens, cleanup everything on exit so that we can recover
// by launcing a new remote.
defer func() {
if err != nil {
s.cleanup()
}
}()
payload := req.Payload.(rpcwrapper.UpdateSecretsPayload)
s.secrets, err = secrets.NewSecrets(payload.Secrets)
if err != nil {
return err
}
err = s.enforcer.UpdateSecrets(s.secrets)
return err
} | go | func (s *RemoteEnforcer) UpdateSecrets(req rpcwrapper.Request, resp *rpcwrapper.Response) error {
var err error
if !s.rpcHandle.CheckValidity(&req, s.rpcSecret) {
resp.Status = "updatesecrets auth failed"
return fmt.Errorf(resp.Status)
}
cmdLock.Lock()
defer cmdLock.Unlock()
if s.enforcer == nil {
return fmt.Errorf(resp.Status)
}
// If any error happens, cleanup everything on exit so that we can recover
// by launcing a new remote.
defer func() {
if err != nil {
s.cleanup()
}
}()
payload := req.Payload.(rpcwrapper.UpdateSecretsPayload)
s.secrets, err = secrets.NewSecrets(payload.Secrets)
if err != nil {
return err
}
err = s.enforcer.UpdateSecrets(s.secrets)
return err
} | [
"func",
"(",
"s",
"*",
"RemoteEnforcer",
")",
"UpdateSecrets",
"(",
"req",
"rpcwrapper",
".",
"Request",
",",
"resp",
"*",
"rpcwrapper",
".",
"Response",
")",
"error",
"{",
"var",
"err",
"error",
"\n",
"if",
"!",
"s",
".",
"rpcHandle",
".",
"CheckValidity",
"(",
"&",
"req",
",",
"s",
".",
"rpcSecret",
")",
"{",
"resp",
".",
"Status",
"=",
"\"",
"\"",
"\n",
"return",
"fmt",
".",
"Errorf",
"(",
"resp",
".",
"Status",
")",
"\n",
"}",
"\n\n",
"cmdLock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"cmdLock",
".",
"Unlock",
"(",
")",
"\n",
"if",
"s",
".",
"enforcer",
"==",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"resp",
".",
"Status",
")",
"\n",
"}",
"\n\n",
"// If any error happens, cleanup everything on exit so that we can recover",
"// by launcing a new remote.",
"defer",
"func",
"(",
")",
"{",
"if",
"err",
"!=",
"nil",
"{",
"s",
".",
"cleanup",
"(",
")",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n\n",
"payload",
":=",
"req",
".",
"Payload",
".",
"(",
"rpcwrapper",
".",
"UpdateSecretsPayload",
")",
"\n",
"s",
".",
"secrets",
",",
"err",
"=",
"secrets",
".",
"NewSecrets",
"(",
"payload",
".",
"Secrets",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"err",
"=",
"s",
".",
"enforcer",
".",
"UpdateSecrets",
"(",
"s",
".",
"secrets",
")",
"\n\n",
"return",
"err",
"\n",
"}"
] | // UpdateSecrets updates the secrets used by the remote enforcer | [
"UpdateSecrets",
"updates",
"the",
"secrets",
"used",
"by",
"the",
"remote",
"enforcer"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/remoteenforcer/remoteenforcer_linux.go#L309-L339 |
6,841 | aporeto-inc/trireme-lib | controller/pkg/remoteenforcer/remoteenforcer_linux.go | EnableIPTablesPacketTracing | func (s *RemoteEnforcer) EnableIPTablesPacketTracing(req rpcwrapper.Request, resp *rpcwrapper.Response) error {
if !s.rpcHandle.CheckValidity(&req, s.rpcSecret) {
resp.Status = "enable iptable packet tracing auth failed"
return fmt.Errorf(resp.Status)
}
cmdLock.Lock()
defer cmdLock.Unlock()
payload := req.Payload.(rpcwrapper.EnableIPTablesPacketTracingPayLoad)
if err := s.supervisor.EnableIPTablesPacketTracing(context.Background(), payload.ContextID, payload.Interval); err != nil {
resp.Status = err.Error()
return err
}
resp.Status = ""
return nil
} | go | func (s *RemoteEnforcer) EnableIPTablesPacketTracing(req rpcwrapper.Request, resp *rpcwrapper.Response) error {
if !s.rpcHandle.CheckValidity(&req, s.rpcSecret) {
resp.Status = "enable iptable packet tracing auth failed"
return fmt.Errorf(resp.Status)
}
cmdLock.Lock()
defer cmdLock.Unlock()
payload := req.Payload.(rpcwrapper.EnableIPTablesPacketTracingPayLoad)
if err := s.supervisor.EnableIPTablesPacketTracing(context.Background(), payload.ContextID, payload.Interval); err != nil {
resp.Status = err.Error()
return err
}
resp.Status = ""
return nil
} | [
"func",
"(",
"s",
"*",
"RemoteEnforcer",
")",
"EnableIPTablesPacketTracing",
"(",
"req",
"rpcwrapper",
".",
"Request",
",",
"resp",
"*",
"rpcwrapper",
".",
"Response",
")",
"error",
"{",
"if",
"!",
"s",
".",
"rpcHandle",
".",
"CheckValidity",
"(",
"&",
"req",
",",
"s",
".",
"rpcSecret",
")",
"{",
"resp",
".",
"Status",
"=",
"\"",
"\"",
"\n",
"return",
"fmt",
".",
"Errorf",
"(",
"resp",
".",
"Status",
")",
"\n",
"}",
"\n\n",
"cmdLock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"cmdLock",
".",
"Unlock",
"(",
")",
"\n\n",
"payload",
":=",
"req",
".",
"Payload",
".",
"(",
"rpcwrapper",
".",
"EnableIPTablesPacketTracingPayLoad",
")",
"\n\n",
"if",
"err",
":=",
"s",
".",
"supervisor",
".",
"EnableIPTablesPacketTracing",
"(",
"context",
".",
"Background",
"(",
")",
",",
"payload",
".",
"ContextID",
",",
"payload",
".",
"Interval",
")",
";",
"err",
"!=",
"nil",
"{",
"resp",
".",
"Status",
"=",
"err",
".",
"Error",
"(",
")",
"\n",
"return",
"err",
"\n",
"}",
"\n\n",
"resp",
".",
"Status",
"=",
"\"",
"\"",
"\n",
"return",
"nil",
"\n",
"}"
] | // EnableIPTablesPacketTracing enables iptables trace packet tracing | [
"EnableIPTablesPacketTracing",
"enables",
"iptables",
"trace",
"packet",
"tracing"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/remoteenforcer/remoteenforcer_linux.go#L364-L383 |
6,842 | aporeto-inc/trireme-lib | controller/pkg/remoteenforcer/remoteenforcer_linux.go | setupEnforcer | func (s *RemoteEnforcer) setupEnforcer(payload *rpcwrapper.InitRequestPayload) error {
var err error
s.secrets, err = secrets.NewSecrets(payload.Secrets)
if err != nil {
return err
}
if s.enforcer, err = createEnforcer(
payload.MutualAuth,
payload.FqConfig,
s.collector,
s.service,
s.secrets,
payload.ServerID,
payload.Validity,
constants.RemoteContainer,
s.procMountPoint,
payload.ExternalIPCacheTimeout,
payload.PacketLogs,
payload.Configuration,
); err != nil || s.enforcer == nil {
return fmt.Errorf("Error while initializing remote enforcer, %s", err)
}
return nil
} | go | func (s *RemoteEnforcer) setupEnforcer(payload *rpcwrapper.InitRequestPayload) error {
var err error
s.secrets, err = secrets.NewSecrets(payload.Secrets)
if err != nil {
return err
}
if s.enforcer, err = createEnforcer(
payload.MutualAuth,
payload.FqConfig,
s.collector,
s.service,
s.secrets,
payload.ServerID,
payload.Validity,
constants.RemoteContainer,
s.procMountPoint,
payload.ExternalIPCacheTimeout,
payload.PacketLogs,
payload.Configuration,
); err != nil || s.enforcer == nil {
return fmt.Errorf("Error while initializing remote enforcer, %s", err)
}
return nil
} | [
"func",
"(",
"s",
"*",
"RemoteEnforcer",
")",
"setupEnforcer",
"(",
"payload",
"*",
"rpcwrapper",
".",
"InitRequestPayload",
")",
"error",
"{",
"var",
"err",
"error",
"\n\n",
"s",
".",
"secrets",
",",
"err",
"=",
"secrets",
".",
"NewSecrets",
"(",
"payload",
".",
"Secrets",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"if",
"s",
".",
"enforcer",
",",
"err",
"=",
"createEnforcer",
"(",
"payload",
".",
"MutualAuth",
",",
"payload",
".",
"FqConfig",
",",
"s",
".",
"collector",
",",
"s",
".",
"service",
",",
"s",
".",
"secrets",
",",
"payload",
".",
"ServerID",
",",
"payload",
".",
"Validity",
",",
"constants",
".",
"RemoteContainer",
",",
"s",
".",
"procMountPoint",
",",
"payload",
".",
"ExternalIPCacheTimeout",
",",
"payload",
".",
"PacketLogs",
",",
"payload",
".",
"Configuration",
",",
")",
";",
"err",
"!=",
"nil",
"||",
"s",
".",
"enforcer",
"==",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // setup an enforcer | [
"setup",
"an",
"enforcer"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/remoteenforcer/remoteenforcer_linux.go#L386-L413 |
6,843 | aporeto-inc/trireme-lib | controller/pkg/remoteenforcer/remoteenforcer_linux.go | cleanup | func (s *RemoteEnforcer) cleanup() {
if s.supervisor != nil {
if err := s.supervisor.CleanUp(); err != nil {
zap.L().Error("unable to clean supervisor state", zap.Error(err))
}
}
if s.enforcer != nil {
if err := s.enforcer.CleanUp(); err != nil {
zap.L().Error("unable to clean enforcer state", zap.Error(err))
}
}
if s.service != nil {
if err := s.service.Stop(); err != nil {
zap.L().Error("unable to clean service state", zap.Error(err))
}
}
s.cancel()
} | go | func (s *RemoteEnforcer) cleanup() {
if s.supervisor != nil {
if err := s.supervisor.CleanUp(); err != nil {
zap.L().Error("unable to clean supervisor state", zap.Error(err))
}
}
if s.enforcer != nil {
if err := s.enforcer.CleanUp(); err != nil {
zap.L().Error("unable to clean enforcer state", zap.Error(err))
}
}
if s.service != nil {
if err := s.service.Stop(); err != nil {
zap.L().Error("unable to clean service state", zap.Error(err))
}
}
s.cancel()
} | [
"func",
"(",
"s",
"*",
"RemoteEnforcer",
")",
"cleanup",
"(",
")",
"{",
"if",
"s",
".",
"supervisor",
"!=",
"nil",
"{",
"if",
"err",
":=",
"s",
".",
"supervisor",
".",
"CleanUp",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"s",
".",
"enforcer",
"!=",
"nil",
"{",
"if",
"err",
":=",
"s",
".",
"enforcer",
".",
"CleanUp",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"s",
".",
"service",
"!=",
"nil",
"{",
"if",
"err",
":=",
"s",
".",
"service",
".",
"Stop",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"s",
".",
"cancel",
"(",
")",
"\n",
"}"
] | // cleanup cleans all the acls and any state of the local enforcer. | [
"cleanup",
"cleans",
"all",
"the",
"acls",
"and",
"any",
"state",
"of",
"the",
"local",
"enforcer",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/remoteenforcer/remoteenforcer_linux.go#L433-L454 |
6,844 | aporeto-inc/trireme-lib | controller/pkg/remoteenforcer/remoteenforcer_linux.go | LaunchRemoteEnforcer | func LaunchRemoteEnforcer(service packetprocessor.PacketProcessor) error {
// Before doing anything validate that we are in the right namespace.
if err := validateNamespace(); err != nil {
return err
}
ctx, cancelMainCtx := context.WithCancel(context.Background())
defer cancelMainCtx()
namedPipe := os.Getenv(constants.EnvContextSocket)
secret := os.Getenv(constants.EnvRPCClientSecret)
if secret == "" {
zap.L().Fatal("No secret found")
}
flag := unix.SIGHUP
if err := unix.Prctl(unix.PR_SET_PDEATHSIG, uintptr(flag), 0, 0, 0); err != nil {
return err
}
rpcHandle := rpcwrapper.NewRPCServer()
re, err := newRemoteEnforcer(ctx, cancelMainCtx, service, rpcHandle, secret, nil, nil, nil)
if err != nil {
return err
}
go func() {
if err := rpcHandle.StartServer(ctx, "unix", namedPipe, re); err != nil {
zap.L().Fatal("Failed to start the server", zap.Error(err))
}
}()
c := make(chan os.Signal, 1)
signal.Notify(c, syscall.SIGTERM, syscall.SIGINT, syscall.SIGQUIT)
select {
case <-c:
re.cleanup()
case <-re.exit:
zap.L().Info("Remote enforcer exiting ...")
}
return nil
} | go | func LaunchRemoteEnforcer(service packetprocessor.PacketProcessor) error {
// Before doing anything validate that we are in the right namespace.
if err := validateNamespace(); err != nil {
return err
}
ctx, cancelMainCtx := context.WithCancel(context.Background())
defer cancelMainCtx()
namedPipe := os.Getenv(constants.EnvContextSocket)
secret := os.Getenv(constants.EnvRPCClientSecret)
if secret == "" {
zap.L().Fatal("No secret found")
}
flag := unix.SIGHUP
if err := unix.Prctl(unix.PR_SET_PDEATHSIG, uintptr(flag), 0, 0, 0); err != nil {
return err
}
rpcHandle := rpcwrapper.NewRPCServer()
re, err := newRemoteEnforcer(ctx, cancelMainCtx, service, rpcHandle, secret, nil, nil, nil)
if err != nil {
return err
}
go func() {
if err := rpcHandle.StartServer(ctx, "unix", namedPipe, re); err != nil {
zap.L().Fatal("Failed to start the server", zap.Error(err))
}
}()
c := make(chan os.Signal, 1)
signal.Notify(c, syscall.SIGTERM, syscall.SIGINT, syscall.SIGQUIT)
select {
case <-c:
re.cleanup()
case <-re.exit:
zap.L().Info("Remote enforcer exiting ...")
}
return nil
} | [
"func",
"LaunchRemoteEnforcer",
"(",
"service",
"packetprocessor",
".",
"PacketProcessor",
")",
"error",
"{",
"// Before doing anything validate that we are in the right namespace.",
"if",
"err",
":=",
"validateNamespace",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"ctx",
",",
"cancelMainCtx",
":=",
"context",
".",
"WithCancel",
"(",
"context",
".",
"Background",
"(",
")",
")",
"\n",
"defer",
"cancelMainCtx",
"(",
")",
"\n\n",
"namedPipe",
":=",
"os",
".",
"Getenv",
"(",
"constants",
".",
"EnvContextSocket",
")",
"\n",
"secret",
":=",
"os",
".",
"Getenv",
"(",
"constants",
".",
"EnvRPCClientSecret",
")",
"\n",
"if",
"secret",
"==",
"\"",
"\"",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Fatal",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"flag",
":=",
"unix",
".",
"SIGHUP",
"\n",
"if",
"err",
":=",
"unix",
".",
"Prctl",
"(",
"unix",
".",
"PR_SET_PDEATHSIG",
",",
"uintptr",
"(",
"flag",
")",
",",
"0",
",",
"0",
",",
"0",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"rpcHandle",
":=",
"rpcwrapper",
".",
"NewRPCServer",
"(",
")",
"\n",
"re",
",",
"err",
":=",
"newRemoteEnforcer",
"(",
"ctx",
",",
"cancelMainCtx",
",",
"service",
",",
"rpcHandle",
",",
"secret",
",",
"nil",
",",
"nil",
",",
"nil",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"go",
"func",
"(",
")",
"{",
"if",
"err",
":=",
"rpcHandle",
".",
"StartServer",
"(",
"ctx",
",",
"\"",
"\"",
",",
"namedPipe",
",",
"re",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Fatal",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n\n",
"c",
":=",
"make",
"(",
"chan",
"os",
".",
"Signal",
",",
"1",
")",
"\n",
"signal",
".",
"Notify",
"(",
"c",
",",
"syscall",
".",
"SIGTERM",
",",
"syscall",
".",
"SIGINT",
",",
"syscall",
".",
"SIGQUIT",
")",
"\n\n",
"select",
"{",
"case",
"<-",
"c",
":",
"re",
".",
"cleanup",
"(",
")",
"\n\n",
"case",
"<-",
"re",
".",
"exit",
":",
"zap",
".",
"L",
"(",
")",
".",
"Info",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // LaunchRemoteEnforcer launches a remote enforcer | [
"LaunchRemoteEnforcer",
"launches",
"a",
"remote",
"enforcer"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/remoteenforcer/remoteenforcer_linux.go#L457-L503 |
6,845 | aporeto-inc/trireme-lib | controller/pkg/remoteenforcer/remoteenforcer_linux.go | getCEnvVariable | func getCEnvVariable(name string) string {
val := C.getenv(C.CString(name))
if val == nil {
return ""
}
return C.GoString(val)
} | go | func getCEnvVariable(name string) string {
val := C.getenv(C.CString(name))
if val == nil {
return ""
}
return C.GoString(val)
} | [
"func",
"getCEnvVariable",
"(",
"name",
"string",
")",
"string",
"{",
"val",
":=",
"C",
".",
"getenv",
"(",
"C",
".",
"CString",
"(",
"name",
")",
")",
"\n",
"if",
"val",
"==",
"nil",
"{",
"return",
"\"",
"\"",
"\n",
"}",
"\n\n",
"return",
"C",
".",
"GoString",
"(",
"val",
")",
"\n",
"}"
] | // getCEnvVariable returns an environment variable set in the c context | [
"getCEnvVariable",
"returns",
"an",
"environment",
"variable",
"set",
"in",
"the",
"c",
"context"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/remoteenforcer/remoteenforcer_linux.go#L506-L514 |
6,846 | aporeto-inc/trireme-lib | controller/pkg/urisearch/urisearch.go | NewAPICache | func NewAPICache(rules []*policy.HTTPRule, id string, external bool) *APICache {
a := &APICache{
methodRoots: map[string]*node{},
ID: id,
External: external,
}
for _, rule := range rules {
sc := &scopeRule{
rule: rule,
}
for _, method := range rule.Methods {
if _, ok := a.methodRoots[method]; !ok {
a.methodRoots[method] = &node{}
}
for _, uri := range rule.URIs {
insert(a.methodRoots[method], uri, sc)
}
}
}
return a
} | go | func NewAPICache(rules []*policy.HTTPRule, id string, external bool) *APICache {
a := &APICache{
methodRoots: map[string]*node{},
ID: id,
External: external,
}
for _, rule := range rules {
sc := &scopeRule{
rule: rule,
}
for _, method := range rule.Methods {
if _, ok := a.methodRoots[method]; !ok {
a.methodRoots[method] = &node{}
}
for _, uri := range rule.URIs {
insert(a.methodRoots[method], uri, sc)
}
}
}
return a
} | [
"func",
"NewAPICache",
"(",
"rules",
"[",
"]",
"*",
"policy",
".",
"HTTPRule",
",",
"id",
"string",
",",
"external",
"bool",
")",
"*",
"APICache",
"{",
"a",
":=",
"&",
"APICache",
"{",
"methodRoots",
":",
"map",
"[",
"string",
"]",
"*",
"node",
"{",
"}",
",",
"ID",
":",
"id",
",",
"External",
":",
"external",
",",
"}",
"\n\n",
"for",
"_",
",",
"rule",
":=",
"range",
"rules",
"{",
"sc",
":=",
"&",
"scopeRule",
"{",
"rule",
":",
"rule",
",",
"}",
"\n",
"for",
"_",
",",
"method",
":=",
"range",
"rule",
".",
"Methods",
"{",
"if",
"_",
",",
"ok",
":=",
"a",
".",
"methodRoots",
"[",
"method",
"]",
";",
"!",
"ok",
"{",
"a",
".",
"methodRoots",
"[",
"method",
"]",
"=",
"&",
"node",
"{",
"}",
"\n",
"}",
"\n",
"for",
"_",
",",
"uri",
":=",
"range",
"rule",
".",
"URIs",
"{",
"insert",
"(",
"a",
".",
"methodRoots",
"[",
"method",
"]",
",",
"uri",
",",
"sc",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"a",
"\n",
"}"
] | // NewAPICache creates a new API cache | [
"NewAPICache",
"creates",
"a",
"new",
"API",
"cache"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/urisearch/urisearch.go#L25-L47 |
6,847 | aporeto-inc/trireme-lib | controller/pkg/urisearch/urisearch.go | FindRule | func (c *APICache) FindRule(verb, uri string) (bool, *policy.HTTPRule) {
found, rule := c.Find(verb, uri)
if rule == nil {
return found, nil
}
if policyRule, ok := rule.(*scopeRule); ok {
return found, policyRule.rule
}
return false, nil
} | go | func (c *APICache) FindRule(verb, uri string) (bool, *policy.HTTPRule) {
found, rule := c.Find(verb, uri)
if rule == nil {
return found, nil
}
if policyRule, ok := rule.(*scopeRule); ok {
return found, policyRule.rule
}
return false, nil
} | [
"func",
"(",
"c",
"*",
"APICache",
")",
"FindRule",
"(",
"verb",
",",
"uri",
"string",
")",
"(",
"bool",
",",
"*",
"policy",
".",
"HTTPRule",
")",
"{",
"found",
",",
"rule",
":=",
"c",
".",
"Find",
"(",
"verb",
",",
"uri",
")",
"\n",
"if",
"rule",
"==",
"nil",
"{",
"return",
"found",
",",
"nil",
"\n",
"}",
"\n",
"if",
"policyRule",
",",
"ok",
":=",
"rule",
".",
"(",
"*",
"scopeRule",
")",
";",
"ok",
"{",
"return",
"found",
",",
"policyRule",
".",
"rule",
"\n",
"}",
"\n",
"return",
"false",
",",
"nil",
"\n",
"}"
] | // FindRule finds a rule in the APICache without validating scopes | [
"FindRule",
"finds",
"a",
"rule",
"in",
"the",
"APICache",
"without",
"validating",
"scopes"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/urisearch/urisearch.go#L50-L59 |
6,848 | aporeto-inc/trireme-lib | controller/pkg/urisearch/urisearch.go | FindAndMatchScope | func (c *APICache) FindAndMatchScope(verb, uri string, attributes []string) (bool, bool) {
found, rule := c.Find(verb, uri)
if !found || rule == nil {
return false, false
}
policyRule, ok := rule.(*scopeRule)
if !ok {
return false, false
}
if policyRule.rule.Public {
return true, true
}
return c.MatchClaims(policyRule.rule.ClaimMatchingRules, attributes), false
} | go | func (c *APICache) FindAndMatchScope(verb, uri string, attributes []string) (bool, bool) {
found, rule := c.Find(verb, uri)
if !found || rule == nil {
return false, false
}
policyRule, ok := rule.(*scopeRule)
if !ok {
return false, false
}
if policyRule.rule.Public {
return true, true
}
return c.MatchClaims(policyRule.rule.ClaimMatchingRules, attributes), false
} | [
"func",
"(",
"c",
"*",
"APICache",
")",
"FindAndMatchScope",
"(",
"verb",
",",
"uri",
"string",
",",
"attributes",
"[",
"]",
"string",
")",
"(",
"bool",
",",
"bool",
")",
"{",
"found",
",",
"rule",
":=",
"c",
".",
"Find",
"(",
"verb",
",",
"uri",
")",
"\n",
"if",
"!",
"found",
"||",
"rule",
"==",
"nil",
"{",
"return",
"false",
",",
"false",
"\n",
"}",
"\n",
"policyRule",
",",
"ok",
":=",
"rule",
".",
"(",
"*",
"scopeRule",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"false",
",",
"false",
"\n",
"}",
"\n",
"if",
"policyRule",
".",
"rule",
".",
"Public",
"{",
"return",
"true",
",",
"true",
"\n",
"}",
"\n",
"return",
"c",
".",
"MatchClaims",
"(",
"policyRule",
".",
"rule",
".",
"ClaimMatchingRules",
",",
"attributes",
")",
",",
"false",
"\n",
"}"
] | // FindAndMatchScope finds the rule and returns true only if the scope matches
// as well. It also returns true of this was a public rule, allowing the callers
// to decide how to present the data or potentially what to do if authorization
// fails. | [
"FindAndMatchScope",
"finds",
"the",
"rule",
"and",
"returns",
"true",
"only",
"if",
"the",
"scope",
"matches",
"as",
"well",
".",
"It",
"also",
"returns",
"true",
"of",
"this",
"was",
"a",
"public",
"rule",
"allowing",
"the",
"callers",
"to",
"decide",
"how",
"to",
"present",
"the",
"data",
"or",
"potentially",
"what",
"to",
"do",
"if",
"authorization",
"fails",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/urisearch/urisearch.go#L65-L78 |
6,849 | aporeto-inc/trireme-lib | controller/pkg/urisearch/urisearch.go | MatchClaims | func (c *APICache) MatchClaims(rules [][]string, claims []string) bool {
claimsMap := map[string]struct{}{}
for _, claim := range claims {
claimsMap[claim] = struct{}{}
}
var matched int
for _, clause := range rules {
matched = len(clause)
for _, claim := range clause {
if _, ok := claimsMap[claim]; ok {
matched--
}
if matched == 0 {
return true
}
}
}
return false
} | go | func (c *APICache) MatchClaims(rules [][]string, claims []string) bool {
claimsMap := map[string]struct{}{}
for _, claim := range claims {
claimsMap[claim] = struct{}{}
}
var matched int
for _, clause := range rules {
matched = len(clause)
for _, claim := range clause {
if _, ok := claimsMap[claim]; ok {
matched--
}
if matched == 0 {
return true
}
}
}
return false
} | [
"func",
"(",
"c",
"*",
"APICache",
")",
"MatchClaims",
"(",
"rules",
"[",
"]",
"[",
"]",
"string",
",",
"claims",
"[",
"]",
"string",
")",
"bool",
"{",
"claimsMap",
":=",
"map",
"[",
"string",
"]",
"struct",
"{",
"}",
"{",
"}",
"\n",
"for",
"_",
",",
"claim",
":=",
"range",
"claims",
"{",
"claimsMap",
"[",
"claim",
"]",
"=",
"struct",
"{",
"}",
"{",
"}",
"\n",
"}",
"\n\n",
"var",
"matched",
"int",
"\n",
"for",
"_",
",",
"clause",
":=",
"range",
"rules",
"{",
"matched",
"=",
"len",
"(",
"clause",
")",
"\n",
"for",
"_",
",",
"claim",
":=",
"range",
"clause",
"{",
"if",
"_",
",",
"ok",
":=",
"claimsMap",
"[",
"claim",
"]",
";",
"ok",
"{",
"matched",
"--",
"\n",
"}",
"\n",
"if",
"matched",
"==",
"0",
"{",
"return",
"true",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"false",
"\n",
"}"
] | // MatchClaims receives a set of claim matchibg rules and a set of claims
// and returns true of the claims match the rules. | [
"MatchClaims",
"receives",
"a",
"set",
"of",
"claim",
"matchibg",
"rules",
"and",
"a",
"set",
"of",
"claims",
"and",
"returns",
"true",
"of",
"the",
"claims",
"match",
"the",
"rules",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/urisearch/urisearch.go#L82-L102 |
6,850 | aporeto-inc/trireme-lib | controller/pkg/urisearch/urisearch.go | Find | func (c *APICache) Find(verb, uri string) (bool, interface{}) {
root, ok := c.methodRoots[verb]
if !ok {
return false, nil
}
return search(root, uri)
} | go | func (c *APICache) Find(verb, uri string) (bool, interface{}) {
root, ok := c.methodRoots[verb]
if !ok {
return false, nil
}
return search(root, uri)
} | [
"func",
"(",
"c",
"*",
"APICache",
")",
"Find",
"(",
"verb",
",",
"uri",
"string",
")",
"(",
"bool",
",",
"interface",
"{",
"}",
")",
"{",
"root",
",",
"ok",
":=",
"c",
".",
"methodRoots",
"[",
"verb",
"]",
"\n",
"if",
"!",
"ok",
"{",
"return",
"false",
",",
"nil",
"\n",
"}",
"\n",
"return",
"search",
"(",
"root",
",",
"uri",
")",
"\n",
"}"
] | // Find finds a URI in the cache and returns true and the data if found.
// If not found it returns false. | [
"Find",
"finds",
"a",
"URI",
"in",
"the",
"cache",
"and",
"returns",
"true",
"and",
"the",
"data",
"if",
"found",
".",
"If",
"not",
"found",
"it",
"returns",
"false",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/urisearch/urisearch.go#L106-L112 |
6,851 | aporeto-inc/trireme-lib | controller/pkg/urisearch/urisearch.go | parse | func parse(s string) (string, string) {
if s == "/" {
return s, ""
}
for i := 1; i < len(s); i++ {
if s[i] == '/' {
return s[0:i], s[i:]
}
}
return s, ""
} | go | func parse(s string) (string, string) {
if s == "/" {
return s, ""
}
for i := 1; i < len(s); i++ {
if s[i] == '/' {
return s[0:i], s[i:]
}
}
return s, ""
} | [
"func",
"parse",
"(",
"s",
"string",
")",
"(",
"string",
",",
"string",
")",
"{",
"if",
"s",
"==",
"\"",
"\"",
"{",
"return",
"s",
",",
"\"",
"\"",
"\n",
"}",
"\n",
"for",
"i",
":=",
"1",
";",
"i",
"<",
"len",
"(",
"s",
")",
";",
"i",
"++",
"{",
"if",
"s",
"[",
"i",
"]",
"==",
"'/'",
"{",
"return",
"s",
"[",
"0",
":",
"i",
"]",
",",
"s",
"[",
"i",
":",
"]",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"s",
",",
"\"",
"\"",
"\n",
"}"
] | // parse parses a URI and splits into prefix, suffix | [
"parse",
"parses",
"a",
"URI",
"and",
"splits",
"into",
"prefix",
"suffix"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/urisearch/urisearch.go#L115-L126 |
6,852 | aporeto-inc/trireme-lib | controller/pkg/urisearch/urisearch.go | insert | func insert(n *node, api string, data interface{}) {
if len(api) == 0 {
n.data = data
n.leaf = true
return
}
prefix, suffix := parse(api)
// root node or terminal node
if prefix == "/" {
n.data = data
n.leaf = true
return
}
if n.children == nil {
n.children = map[string]*node{}
}
// If there is no child, add the new child.
next, ok := n.children[prefix]
if !ok {
next = &node{}
n.children[prefix] = next
}
insert(next, suffix, data)
} | go | func insert(n *node, api string, data interface{}) {
if len(api) == 0 {
n.data = data
n.leaf = true
return
}
prefix, suffix := parse(api)
// root node or terminal node
if prefix == "/" {
n.data = data
n.leaf = true
return
}
if n.children == nil {
n.children = map[string]*node{}
}
// If there is no child, add the new child.
next, ok := n.children[prefix]
if !ok {
next = &node{}
n.children[prefix] = next
}
insert(next, suffix, data)
} | [
"func",
"insert",
"(",
"n",
"*",
"node",
",",
"api",
"string",
",",
"data",
"interface",
"{",
"}",
")",
"{",
"if",
"len",
"(",
"api",
")",
"==",
"0",
"{",
"n",
".",
"data",
"=",
"data",
"\n",
"n",
".",
"leaf",
"=",
"true",
"\n",
"return",
"\n",
"}",
"\n\n",
"prefix",
",",
"suffix",
":=",
"parse",
"(",
"api",
")",
"\n\n",
"// root node or terminal node",
"if",
"prefix",
"==",
"\"",
"\"",
"{",
"n",
".",
"data",
"=",
"data",
"\n",
"n",
".",
"leaf",
"=",
"true",
"\n",
"return",
"\n",
"}",
"\n\n",
"if",
"n",
".",
"children",
"==",
"nil",
"{",
"n",
".",
"children",
"=",
"map",
"[",
"string",
"]",
"*",
"node",
"{",
"}",
"\n",
"}",
"\n\n",
"// If there is no child, add the new child.",
"next",
",",
"ok",
":=",
"n",
".",
"children",
"[",
"prefix",
"]",
"\n",
"if",
"!",
"ok",
"{",
"next",
"=",
"&",
"node",
"{",
"}",
"\n",
"n",
".",
"children",
"[",
"prefix",
"]",
"=",
"next",
"\n",
"}",
"\n\n",
"insert",
"(",
"next",
",",
"suffix",
",",
"data",
")",
"\n",
"}"
] | // insert adds an api to the api cache | [
"insert",
"adds",
"an",
"api",
"to",
"the",
"api",
"cache"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/urisearch/urisearch.go#L129-L157 |
6,853 | aporeto-inc/trireme-lib | monitor/internal/docker/helpers.go | getPausePUID | func getPausePUID(extensions policy.ExtendedMap) string {
if extensions == nil {
return ""
}
if puid, ok := extensions.Get(constants.DockerHostPUID); ok {
zap.L().Debug("puid of pause container is", zap.String("puid", puid))
return puid
}
return ""
} | go | func getPausePUID(extensions policy.ExtendedMap) string {
if extensions == nil {
return ""
}
if puid, ok := extensions.Get(constants.DockerHostPUID); ok {
zap.L().Debug("puid of pause container is", zap.String("puid", puid))
return puid
}
return ""
} | [
"func",
"getPausePUID",
"(",
"extensions",
"policy",
".",
"ExtendedMap",
")",
"string",
"{",
"if",
"extensions",
"==",
"nil",
"{",
"return",
"\"",
"\"",
"\n",
"}",
"\n\n",
"if",
"puid",
",",
"ok",
":=",
"extensions",
".",
"Get",
"(",
"constants",
".",
"DockerHostPUID",
")",
";",
"ok",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"puid",
")",
")",
"\n",
"return",
"puid",
"\n",
"}",
"\n\n",
"return",
"\"",
"\"",
"\n",
"}"
] | // getPausePUID returns puid of pause container. | [
"getPausePUID",
"returns",
"puid",
"of",
"pause",
"container",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/docker/helpers.go#L11-L23 |
6,854 | aporeto-inc/trireme-lib | monitor/internal/docker/helpers.go | policyExtensions | func policyExtensions(runtime policy.RuntimeReader) (extensions policy.ExtendedMap) {
if runtime == nil {
return nil
}
if runtime.Options().PolicyExtensions == nil {
return nil
}
if extensions, ok := runtime.Options().PolicyExtensions.(policy.ExtendedMap); ok {
return extensions
}
return nil
} | go | func policyExtensions(runtime policy.RuntimeReader) (extensions policy.ExtendedMap) {
if runtime == nil {
return nil
}
if runtime.Options().PolicyExtensions == nil {
return nil
}
if extensions, ok := runtime.Options().PolicyExtensions.(policy.ExtendedMap); ok {
return extensions
}
return nil
} | [
"func",
"policyExtensions",
"(",
"runtime",
"policy",
".",
"RuntimeReader",
")",
"(",
"extensions",
"policy",
".",
"ExtendedMap",
")",
"{",
"if",
"runtime",
"==",
"nil",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"if",
"runtime",
".",
"Options",
"(",
")",
".",
"PolicyExtensions",
"==",
"nil",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"if",
"extensions",
",",
"ok",
":=",
"runtime",
".",
"Options",
"(",
")",
".",
"PolicyExtensions",
".",
"(",
"policy",
".",
"ExtendedMap",
")",
";",
"ok",
"{",
"return",
"extensions",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // PolicyExtensions retrieves policy extensions | [
"PolicyExtensions",
"retrieves",
"policy",
"extensions"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/docker/helpers.go#L26-L40 |
6,855 | aporeto-inc/trireme-lib | monitor/internal/docker/helpers.go | isHostNetworkContainer | func isHostNetworkContainer(runtime policy.RuntimeReader) bool {
return runtime.PUType() == common.LinuxProcessPU || (getPausePUID(policyExtensions(runtime)) != "")
} | go | func isHostNetworkContainer(runtime policy.RuntimeReader) bool {
return runtime.PUType() == common.LinuxProcessPU || (getPausePUID(policyExtensions(runtime)) != "")
} | [
"func",
"isHostNetworkContainer",
"(",
"runtime",
"policy",
".",
"RuntimeReader",
")",
"bool",
"{",
"return",
"runtime",
".",
"PUType",
"(",
")",
"==",
"common",
".",
"LinuxProcessPU",
"||",
"(",
"getPausePUID",
"(",
"policyExtensions",
"(",
"runtime",
")",
")",
"!=",
"\"",
"\"",
")",
"\n",
"}"
] | // IsHostNetworkContainer returns true if container has hostnetwork set
// to true or is linked to container with hostnetwork set to true. | [
"IsHostNetworkContainer",
"returns",
"true",
"if",
"container",
"has",
"hostnetwork",
"set",
"to",
"true",
"or",
"is",
"linked",
"to",
"container",
"with",
"hostnetwork",
"set",
"to",
"true",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/docker/helpers.go#L44-L47 |
6,856 | aporeto-inc/trireme-lib | monitor/internal/docker/helpers.go | isKubernetesContainer | func isKubernetesContainer(labels map[string]string) bool {
if _, ok := labels[constants.K8sPodNamespace]; ok {
return true
}
return false
} | go | func isKubernetesContainer(labels map[string]string) bool {
if _, ok := labels[constants.K8sPodNamespace]; ok {
return true
}
return false
} | [
"func",
"isKubernetesContainer",
"(",
"labels",
"map",
"[",
"string",
"]",
"string",
")",
"bool",
"{",
"if",
"_",
",",
"ok",
":=",
"labels",
"[",
"constants",
".",
"K8sPodNamespace",
"]",
";",
"ok",
"{",
"return",
"true",
"\n",
"}",
"\n",
"return",
"false",
"\n",
"}"
] | // IsKubernetesContainer checks if the container is in K8s. | [
"IsKubernetesContainer",
"checks",
"if",
"the",
"container",
"is",
"in",
"K8s",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/docker/helpers.go#L50-L56 |
6,857 | aporeto-inc/trireme-lib | monitor/internal/docker/helpers.go | kubePodIdentifier | func kubePodIdentifier(labels map[string]string) string {
if !isKubernetesContainer(labels) {
return ""
}
podName := ""
podNamespace := ""
podNamespace, ok := labels[constants.K8sPodNamespace]
if !ok {
podNamespace = ""
}
podName, ok = labels[constants.K8sPodName]
if !ok {
podName = ""
}
if podName == "" || podNamespace == "" {
zap.L().Warn("K8s pod does not have podname/podnamespace labels")
return ""
}
return podNamespace + "/" + podName
} | go | func kubePodIdentifier(labels map[string]string) string {
if !isKubernetesContainer(labels) {
return ""
}
podName := ""
podNamespace := ""
podNamespace, ok := labels[constants.K8sPodNamespace]
if !ok {
podNamespace = ""
}
podName, ok = labels[constants.K8sPodName]
if !ok {
podName = ""
}
if podName == "" || podNamespace == "" {
zap.L().Warn("K8s pod does not have podname/podnamespace labels")
return ""
}
return podNamespace + "/" + podName
} | [
"func",
"kubePodIdentifier",
"(",
"labels",
"map",
"[",
"string",
"]",
"string",
")",
"string",
"{",
"if",
"!",
"isKubernetesContainer",
"(",
"labels",
")",
"{",
"return",
"\"",
"\"",
"\n",
"}",
"\n",
"podName",
":=",
"\"",
"\"",
"\n",
"podNamespace",
":=",
"\"",
"\"",
"\n\n",
"podNamespace",
",",
"ok",
":=",
"labels",
"[",
"constants",
".",
"K8sPodNamespace",
"]",
"\n",
"if",
"!",
"ok",
"{",
"podNamespace",
"=",
"\"",
"\"",
"\n",
"}",
"\n\n",
"podName",
",",
"ok",
"=",
"labels",
"[",
"constants",
".",
"K8sPodName",
"]",
"\n",
"if",
"!",
"ok",
"{",
"podName",
"=",
"\"",
"\"",
"\n",
"}",
"\n\n",
"if",
"podName",
"==",
"\"",
"\"",
"||",
"podNamespace",
"==",
"\"",
"\"",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Warn",
"(",
"\"",
"\"",
")",
"\n",
"return",
"\"",
"\"",
"\n",
"}",
"\n\n",
"return",
"podNamespace",
"+",
"\"",
"\"",
"+",
"podName",
"\n",
"}"
] | // KubePodIdentifier returns identifier for K8s pod. | [
"KubePodIdentifier",
"returns",
"identifier",
"for",
"K8s",
"pod",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/docker/helpers.go#L59-L83 |
6,858 | aporeto-inc/trireme-lib | controller/internal/enforcer/lookup/lookup.go | NewPolicyDB | func NewPolicyDB() (m *PolicyDB) {
m = &PolicyDB{
numberOfPolicies: 0,
equalPrefixes: map[string]intList{},
equalMapTable: map[string]map[string][]*ForwardingPolicy{},
equalIDMapTable: map[string][]*ForwardingPolicy{},
notEqualMapTable: map[string]map[string][]*ForwardingPolicy{},
notStarTable: map[string][]*ForwardingPolicy{},
defaultNotExistsPolicy: nil,
}
return m
} | go | func NewPolicyDB() (m *PolicyDB) {
m = &PolicyDB{
numberOfPolicies: 0,
equalPrefixes: map[string]intList{},
equalMapTable: map[string]map[string][]*ForwardingPolicy{},
equalIDMapTable: map[string][]*ForwardingPolicy{},
notEqualMapTable: map[string]map[string][]*ForwardingPolicy{},
notStarTable: map[string][]*ForwardingPolicy{},
defaultNotExistsPolicy: nil,
}
return m
} | [
"func",
"NewPolicyDB",
"(",
")",
"(",
"m",
"*",
"PolicyDB",
")",
"{",
"m",
"=",
"&",
"PolicyDB",
"{",
"numberOfPolicies",
":",
"0",
",",
"equalPrefixes",
":",
"map",
"[",
"string",
"]",
"intList",
"{",
"}",
",",
"equalMapTable",
":",
"map",
"[",
"string",
"]",
"map",
"[",
"string",
"]",
"[",
"]",
"*",
"ForwardingPolicy",
"{",
"}",
",",
"equalIDMapTable",
":",
"map",
"[",
"string",
"]",
"[",
"]",
"*",
"ForwardingPolicy",
"{",
"}",
",",
"notEqualMapTable",
":",
"map",
"[",
"string",
"]",
"map",
"[",
"string",
"]",
"[",
"]",
"*",
"ForwardingPolicy",
"{",
"}",
",",
"notStarTable",
":",
"map",
"[",
"string",
"]",
"[",
"]",
"*",
"ForwardingPolicy",
"{",
"}",
",",
"defaultNotExistsPolicy",
":",
"nil",
",",
"}",
"\n\n",
"return",
"m",
"\n",
"}"
] | //NewPolicyDB creates a new PolicyDB for efficient search of policies | [
"NewPolicyDB",
"creates",
"a",
"new",
"PolicyDB",
"for",
"efficient",
"search",
"of",
"policies"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/lookup/lookup.go#L35-L48 |
6,859 | aporeto-inc/trireme-lib | controller/internal/enforcer/lookup/lookup.go | tagSplit | func (m *PolicyDB) tagSplit(tag string, k *string, v *string) error {
l := len(tag)
if l < 3 {
return fmt.Errorf("Invalid tag: invalid length '%s'", tag)
}
if tag[0] == '=' {
return fmt.Errorf("Invalid tag: missing key '%s'", tag)
}
for i := 0; i < l; i++ {
if tag[i] == '=' {
if i+1 >= l {
return fmt.Errorf("Invalid tag: missing value '%s'", tag)
}
*k = tag[:i]
*v = tag[i+1:]
return nil
}
}
return fmt.Errorf("Invalid tag: missing equal symbol '%s'", tag)
} | go | func (m *PolicyDB) tagSplit(tag string, k *string, v *string) error {
l := len(tag)
if l < 3 {
return fmt.Errorf("Invalid tag: invalid length '%s'", tag)
}
if tag[0] == '=' {
return fmt.Errorf("Invalid tag: missing key '%s'", tag)
}
for i := 0; i < l; i++ {
if tag[i] == '=' {
if i+1 >= l {
return fmt.Errorf("Invalid tag: missing value '%s'", tag)
}
*k = tag[:i]
*v = tag[i+1:]
return nil
}
}
return fmt.Errorf("Invalid tag: missing equal symbol '%s'", tag)
} | [
"func",
"(",
"m",
"*",
"PolicyDB",
")",
"tagSplit",
"(",
"tag",
"string",
",",
"k",
"*",
"string",
",",
"v",
"*",
"string",
")",
"error",
"{",
"l",
":=",
"len",
"(",
"tag",
")",
"\n",
"if",
"l",
"<",
"3",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"tag",
")",
"\n",
"}",
"\n\n",
"if",
"tag",
"[",
"0",
"]",
"==",
"'='",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"tag",
")",
"\n",
"}",
"\n\n",
"for",
"i",
":=",
"0",
";",
"i",
"<",
"l",
";",
"i",
"++",
"{",
"if",
"tag",
"[",
"i",
"]",
"==",
"'='",
"{",
"if",
"i",
"+",
"1",
">=",
"l",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"tag",
")",
"\n",
"}",
"\n",
"*",
"k",
"=",
"tag",
"[",
":",
"i",
"]",
"\n",
"*",
"v",
"=",
"tag",
"[",
"i",
"+",
"1",
":",
"]",
"\n",
"return",
"nil",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"tag",
")",
"\n",
"}"
] | // Custom implementation for splitting strings. Gives significant performance
// improvement. Do not allocate new strings | [
"Custom",
"implementation",
"for",
"splitting",
"strings",
".",
"Gives",
"significant",
"performance",
"improvement",
".",
"Do",
"not",
"allocate",
"new",
"strings"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/lookup/lookup.go#L151-L173 |
6,860 | aporeto-inc/trireme-lib | controller/internal/enforcer/lookup/lookup.go | Search | func (m *PolicyDB) Search(tags *policy.TagStore) (int, interface{}) {
count := make([]int, m.numberOfPolicies+1)
skip := make([]bool, m.numberOfPolicies+1)
// Disable all policies that fail the not key exists
copiedTags := tags.GetSlice()
var k, v string
for _, t := range copiedTags {
if err := m.tagSplit(t, &k, &v); err != nil {
continue
}
for _, policy := range m.notStarTable[k] {
skip[policy.index] = true
}
}
// Go through the list of tags
for _, t := range copiedTags {
// Search for matches of t (tag id)
if index, action := searchInMapTable(m.equalIDMapTable[t], count, skip); index >= 0 {
return index, action
}
if err := m.tagSplit(t, &k, &v); err != nil {
continue
}
// Search for matches of k=v
if index, action := searchInMapTable(m.equalMapTable[k][v], count, skip); index >= 0 {
return index, action
}
// Search for matches in prefixes
for _, i := range m.equalPrefixes[k] {
if i <= len(v) {
if index, action := searchInMapTable(m.equalMapTable[k][v[:i]], count, skip); index >= 0 {
return index, action
}
}
}
// Parse all of the policies that have a key that matches the incoming tag key
// and a not equal operator and that has a not match rule
for value, policies := range m.notEqualMapTable[k] {
if v == value {
continue
}
if index, action := searchInMapTable(policies, count, skip); index >= 0 {
return index, action
}
}
}
if m.defaultNotExistsPolicy != nil && !skip[m.defaultNotExistsPolicy.index] {
return m.defaultNotExistsPolicy.index, m.defaultNotExistsPolicy.actions
}
return -1, nil
} | go | func (m *PolicyDB) Search(tags *policy.TagStore) (int, interface{}) {
count := make([]int, m.numberOfPolicies+1)
skip := make([]bool, m.numberOfPolicies+1)
// Disable all policies that fail the not key exists
copiedTags := tags.GetSlice()
var k, v string
for _, t := range copiedTags {
if err := m.tagSplit(t, &k, &v); err != nil {
continue
}
for _, policy := range m.notStarTable[k] {
skip[policy.index] = true
}
}
// Go through the list of tags
for _, t := range copiedTags {
// Search for matches of t (tag id)
if index, action := searchInMapTable(m.equalIDMapTable[t], count, skip); index >= 0 {
return index, action
}
if err := m.tagSplit(t, &k, &v); err != nil {
continue
}
// Search for matches of k=v
if index, action := searchInMapTable(m.equalMapTable[k][v], count, skip); index >= 0 {
return index, action
}
// Search for matches in prefixes
for _, i := range m.equalPrefixes[k] {
if i <= len(v) {
if index, action := searchInMapTable(m.equalMapTable[k][v[:i]], count, skip); index >= 0 {
return index, action
}
}
}
// Parse all of the policies that have a key that matches the incoming tag key
// and a not equal operator and that has a not match rule
for value, policies := range m.notEqualMapTable[k] {
if v == value {
continue
}
if index, action := searchInMapTable(policies, count, skip); index >= 0 {
return index, action
}
}
}
if m.defaultNotExistsPolicy != nil && !skip[m.defaultNotExistsPolicy.index] {
return m.defaultNotExistsPolicy.index, m.defaultNotExistsPolicy.actions
}
return -1, nil
} | [
"func",
"(",
"m",
"*",
"PolicyDB",
")",
"Search",
"(",
"tags",
"*",
"policy",
".",
"TagStore",
")",
"(",
"int",
",",
"interface",
"{",
"}",
")",
"{",
"count",
":=",
"make",
"(",
"[",
"]",
"int",
",",
"m",
".",
"numberOfPolicies",
"+",
"1",
")",
"\n\n",
"skip",
":=",
"make",
"(",
"[",
"]",
"bool",
",",
"m",
".",
"numberOfPolicies",
"+",
"1",
")",
"\n\n",
"// Disable all policies that fail the not key exists",
"copiedTags",
":=",
"tags",
".",
"GetSlice",
"(",
")",
"\n",
"var",
"k",
",",
"v",
"string",
"\n\n",
"for",
"_",
",",
"t",
":=",
"range",
"copiedTags",
"{",
"if",
"err",
":=",
"m",
".",
"tagSplit",
"(",
"t",
",",
"&",
"k",
",",
"&",
"v",
")",
";",
"err",
"!=",
"nil",
"{",
"continue",
"\n",
"}",
"\n",
"for",
"_",
",",
"policy",
":=",
"range",
"m",
".",
"notStarTable",
"[",
"k",
"]",
"{",
"skip",
"[",
"policy",
".",
"index",
"]",
"=",
"true",
"\n",
"}",
"\n",
"}",
"\n\n",
"// Go through the list of tags",
"for",
"_",
",",
"t",
":=",
"range",
"copiedTags",
"{",
"// Search for matches of t (tag id)",
"if",
"index",
",",
"action",
":=",
"searchInMapTable",
"(",
"m",
".",
"equalIDMapTable",
"[",
"t",
"]",
",",
"count",
",",
"skip",
")",
";",
"index",
">=",
"0",
"{",
"return",
"index",
",",
"action",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"m",
".",
"tagSplit",
"(",
"t",
",",
"&",
"k",
",",
"&",
"v",
")",
";",
"err",
"!=",
"nil",
"{",
"continue",
"\n",
"}",
"\n\n",
"// Search for matches of k=v",
"if",
"index",
",",
"action",
":=",
"searchInMapTable",
"(",
"m",
".",
"equalMapTable",
"[",
"k",
"]",
"[",
"v",
"]",
",",
"count",
",",
"skip",
")",
";",
"index",
">=",
"0",
"{",
"return",
"index",
",",
"action",
"\n",
"}",
"\n\n",
"// Search for matches in prefixes",
"for",
"_",
",",
"i",
":=",
"range",
"m",
".",
"equalPrefixes",
"[",
"k",
"]",
"{",
"if",
"i",
"<=",
"len",
"(",
"v",
")",
"{",
"if",
"index",
",",
"action",
":=",
"searchInMapTable",
"(",
"m",
".",
"equalMapTable",
"[",
"k",
"]",
"[",
"v",
"[",
":",
"i",
"]",
"]",
",",
"count",
",",
"skip",
")",
";",
"index",
">=",
"0",
"{",
"return",
"index",
",",
"action",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n\n",
"// Parse all of the policies that have a key that matches the incoming tag key",
"// and a not equal operator and that has a not match rule",
"for",
"value",
",",
"policies",
":=",
"range",
"m",
".",
"notEqualMapTable",
"[",
"k",
"]",
"{",
"if",
"v",
"==",
"value",
"{",
"continue",
"\n",
"}",
"\n\n",
"if",
"index",
",",
"action",
":=",
"searchInMapTable",
"(",
"policies",
",",
"count",
",",
"skip",
")",
";",
"index",
">=",
"0",
"{",
"return",
"index",
",",
"action",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"m",
".",
"defaultNotExistsPolicy",
"!=",
"nil",
"&&",
"!",
"skip",
"[",
"m",
".",
"defaultNotExistsPolicy",
".",
"index",
"]",
"{",
"return",
"m",
".",
"defaultNotExistsPolicy",
".",
"index",
",",
"m",
".",
"defaultNotExistsPolicy",
".",
"actions",
"\n",
"}",
"\n\n",
"return",
"-",
"1",
",",
"nil",
"\n",
"}"
] | // Search searches for a set of tags in the database to find a policy match | [
"Search",
"searches",
"for",
"a",
"set",
"of",
"tags",
"in",
"the",
"database",
"to",
"find",
"a",
"policy",
"match"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/lookup/lookup.go#L176-L239 |
6,861 | aporeto-inc/trireme-lib | controller/internal/enforcer/lookup/lookup.go | PrintPolicyDB | func (m *PolicyDB) PrintPolicyDB() {
zap.L().Debug("Print Policy DB: equal table")
for key, values := range m.equalMapTable {
for value, policies := range values {
zap.L().Debug("Print Policy DB",
zap.String("policies", fmt.Sprintf("%#v", policies)),
zap.String("key", key),
zap.String("value", value),
)
}
}
zap.L().Debug("Print Policy DB: equal id table")
for key, values := range m.equalIDMapTable {
for _, policies := range values {
zap.L().Debug("Print Policy DB",
zap.String("policies", fmt.Sprintf("%#v", policies)),
zap.String("key", key),
)
}
}
zap.L().Debug("Print Policy DB - not equal table")
for key, values := range m.notEqualMapTable {
for value, policies := range values {
zap.L().Debug("Print Policy DB",
zap.String("policies", fmt.Sprintf("%#v", policies)),
zap.String("key", key),
zap.String("value", value),
)
}
}
} | go | func (m *PolicyDB) PrintPolicyDB() {
zap.L().Debug("Print Policy DB: equal table")
for key, values := range m.equalMapTable {
for value, policies := range values {
zap.L().Debug("Print Policy DB",
zap.String("policies", fmt.Sprintf("%#v", policies)),
zap.String("key", key),
zap.String("value", value),
)
}
}
zap.L().Debug("Print Policy DB: equal id table")
for key, values := range m.equalIDMapTable {
for _, policies := range values {
zap.L().Debug("Print Policy DB",
zap.String("policies", fmt.Sprintf("%#v", policies)),
zap.String("key", key),
)
}
}
zap.L().Debug("Print Policy DB - not equal table")
for key, values := range m.notEqualMapTable {
for value, policies := range values {
zap.L().Debug("Print Policy DB",
zap.String("policies", fmt.Sprintf("%#v", policies)),
zap.String("key", key),
zap.String("value", value),
)
}
}
} | [
"func",
"(",
"m",
"*",
"PolicyDB",
")",
"PrintPolicyDB",
"(",
")",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n\n",
"for",
"key",
",",
"values",
":=",
"range",
"m",
".",
"equalMapTable",
"{",
"for",
"value",
",",
"policies",
":=",
"range",
"values",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"policies",
")",
")",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"key",
")",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"value",
")",
",",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n\n",
"for",
"key",
",",
"values",
":=",
"range",
"m",
".",
"equalIDMapTable",
"{",
"for",
"_",
",",
"policies",
":=",
"range",
"values",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"policies",
")",
")",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"key",
")",
",",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n\n",
"for",
"key",
",",
"values",
":=",
"range",
"m",
".",
"notEqualMapTable",
"{",
"for",
"value",
",",
"policies",
":=",
"range",
"values",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"policies",
")",
")",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"key",
")",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"value",
")",
",",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"}"
] | // PrintPolicyDB is a debugging function to dump the map | [
"PrintPolicyDB",
"is",
"a",
"debugging",
"function",
"to",
"dump",
"the",
"map"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/lookup/lookup.go#L263-L300 |
6,862 | aporeto-inc/trireme-lib | controller/internal/supervisor/iptablesctrl/acls.go | cgroupChainRules | func (i *Instance) cgroupChainRules(cfg *ACLInfo) [][]string {
// Rules for older distros (eg RH 6.9/Ubuntu 14.04), due to absence of
// cgroup match modules, source ports are used to trap outgoing traffic.
if i.isLegacyKernel && (cfg.PUType == common.HostNetworkPU || cfg.PUType == common.HostPU) {
return i.legacyPuChainRules(
cfg.ContextID,
cfg.AppChain,
cfg.NetChain,
cfg.CgroupMark,
cfg.TCPPorts,
cfg.UDPPorts,
cfg.ProxyPort,
cfg.ProxySetName,
cfg.AppSection,
cfg.NetSection,
cfg.PUType,
)
}
tmpl := template.Must(template.New(cgroupCaptureTemplate).Funcs(template.FuncMap{
"isUDPPorts": func() bool {
return cfg.UDPPorts != "0"
},
"isTCPPorts": func() bool {
return cfg.TCPPorts != "0"
},
"isHostPU": func() bool {
return cfg.AppSection == HostModeOutput && cfg.NetSection == HostModeInput
},
}).Parse(cgroupCaptureTemplate))
rules, err := extractRulesFromTemplate(tmpl, cfg)
if err != nil {
zap.L().Warn("unable to extract rules", zap.Error(err))
}
return append(rules, i.proxyRules(cfg)...)
} | go | func (i *Instance) cgroupChainRules(cfg *ACLInfo) [][]string {
// Rules for older distros (eg RH 6.9/Ubuntu 14.04), due to absence of
// cgroup match modules, source ports are used to trap outgoing traffic.
if i.isLegacyKernel && (cfg.PUType == common.HostNetworkPU || cfg.PUType == common.HostPU) {
return i.legacyPuChainRules(
cfg.ContextID,
cfg.AppChain,
cfg.NetChain,
cfg.CgroupMark,
cfg.TCPPorts,
cfg.UDPPorts,
cfg.ProxyPort,
cfg.ProxySetName,
cfg.AppSection,
cfg.NetSection,
cfg.PUType,
)
}
tmpl := template.Must(template.New(cgroupCaptureTemplate).Funcs(template.FuncMap{
"isUDPPorts": func() bool {
return cfg.UDPPorts != "0"
},
"isTCPPorts": func() bool {
return cfg.TCPPorts != "0"
},
"isHostPU": func() bool {
return cfg.AppSection == HostModeOutput && cfg.NetSection == HostModeInput
},
}).Parse(cgroupCaptureTemplate))
rules, err := extractRulesFromTemplate(tmpl, cfg)
if err != nil {
zap.L().Warn("unable to extract rules", zap.Error(err))
}
return append(rules, i.proxyRules(cfg)...)
} | [
"func",
"(",
"i",
"*",
"Instance",
")",
"cgroupChainRules",
"(",
"cfg",
"*",
"ACLInfo",
")",
"[",
"]",
"[",
"]",
"string",
"{",
"// Rules for older distros (eg RH 6.9/Ubuntu 14.04), due to absence of",
"// cgroup match modules, source ports are used to trap outgoing traffic.",
"if",
"i",
".",
"isLegacyKernel",
"&&",
"(",
"cfg",
".",
"PUType",
"==",
"common",
".",
"HostNetworkPU",
"||",
"cfg",
".",
"PUType",
"==",
"common",
".",
"HostPU",
")",
"{",
"return",
"i",
".",
"legacyPuChainRules",
"(",
"cfg",
".",
"ContextID",
",",
"cfg",
".",
"AppChain",
",",
"cfg",
".",
"NetChain",
",",
"cfg",
".",
"CgroupMark",
",",
"cfg",
".",
"TCPPorts",
",",
"cfg",
".",
"UDPPorts",
",",
"cfg",
".",
"ProxyPort",
",",
"cfg",
".",
"ProxySetName",
",",
"cfg",
".",
"AppSection",
",",
"cfg",
".",
"NetSection",
",",
"cfg",
".",
"PUType",
",",
")",
"\n",
"}",
"\n\n",
"tmpl",
":=",
"template",
".",
"Must",
"(",
"template",
".",
"New",
"(",
"cgroupCaptureTemplate",
")",
".",
"Funcs",
"(",
"template",
".",
"FuncMap",
"{",
"\"",
"\"",
":",
"func",
"(",
")",
"bool",
"{",
"return",
"cfg",
".",
"UDPPorts",
"!=",
"\"",
"\"",
"\n",
"}",
",",
"\"",
"\"",
":",
"func",
"(",
")",
"bool",
"{",
"return",
"cfg",
".",
"TCPPorts",
"!=",
"\"",
"\"",
"\n",
"}",
",",
"\"",
"\"",
":",
"func",
"(",
")",
"bool",
"{",
"return",
"cfg",
".",
"AppSection",
"==",
"HostModeOutput",
"&&",
"cfg",
".",
"NetSection",
"==",
"HostModeInput",
"\n",
"}",
",",
"}",
")",
".",
"Parse",
"(",
"cgroupCaptureTemplate",
")",
")",
"\n\n",
"rules",
",",
"err",
":=",
"extractRulesFromTemplate",
"(",
"tmpl",
",",
"cfg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Warn",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n\n",
"return",
"append",
"(",
"rules",
",",
"i",
".",
"proxyRules",
"(",
"cfg",
")",
"...",
")",
"\n",
"}"
] | // cgroupChainRules provides the rules for redirecting to a processing unit
// specific chain based for Linux processed and based on the cgroups and net_cls
// configuration. | [
"cgroupChainRules",
"provides",
"the",
"rules",
"for",
"redirecting",
"to",
"a",
"processing",
"unit",
"specific",
"chain",
"based",
"for",
"Linux",
"processed",
"and",
"based",
"on",
"the",
"cgroups",
"and",
"net_cls",
"configuration",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/supervisor/iptablesctrl/acls.go#L39-L77 |
6,863 | aporeto-inc/trireme-lib | controller/internal/supervisor/iptablesctrl/acls.go | containerChainRules | func (i *Instance) containerChainRules(cfg *ACLInfo) [][]string {
tmpl := template.Must(template.New(containerChainTemplate).Parse(containerChainTemplate))
rules, err := extractRulesFromTemplate(tmpl, cfg)
if err != nil {
zap.L().Warn("unable to extract rules", zap.Error(err))
}
return append(rules, i.proxyRules(cfg)...)
} | go | func (i *Instance) containerChainRules(cfg *ACLInfo) [][]string {
tmpl := template.Must(template.New(containerChainTemplate).Parse(containerChainTemplate))
rules, err := extractRulesFromTemplate(tmpl, cfg)
if err != nil {
zap.L().Warn("unable to extract rules", zap.Error(err))
}
return append(rules, i.proxyRules(cfg)...)
} | [
"func",
"(",
"i",
"*",
"Instance",
")",
"containerChainRules",
"(",
"cfg",
"*",
"ACLInfo",
")",
"[",
"]",
"[",
"]",
"string",
"{",
"tmpl",
":=",
"template",
".",
"Must",
"(",
"template",
".",
"New",
"(",
"containerChainTemplate",
")",
".",
"Parse",
"(",
"containerChainTemplate",
")",
")",
"\n\n",
"rules",
",",
"err",
":=",
"extractRulesFromTemplate",
"(",
"tmpl",
",",
"cfg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Warn",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n\n",
"return",
"append",
"(",
"rules",
",",
"i",
".",
"proxyRules",
"(",
"cfg",
")",
"...",
")",
"\n",
"}"
] | // containerChainRules provides the list of rules that are used to send traffic to
// a particular chain | [
"containerChainRules",
"provides",
"the",
"list",
"of",
"rules",
"that",
"are",
"used",
"to",
"send",
"traffic",
"to",
"a",
"particular",
"chain"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/supervisor/iptablesctrl/acls.go#L96-L106 |
6,864 | aporeto-inc/trireme-lib | controller/internal/supervisor/iptablesctrl/acls.go | proxyRules | func (i *Instance) proxyRules(cfg *ACLInfo) [][]string {
tmpl := template.Must(template.New(proxyChainTemplate).Funcs(template.FuncMap{
"isCgroupSet": func() bool {
return cfg.CgroupMark != ""
},
}).Parse(proxyChainTemplate))
rules, err := extractRulesFromTemplate(tmpl, cfg)
if err != nil {
zap.L().Warn("unable to extract rules", zap.Error(err))
}
return rules
} | go | func (i *Instance) proxyRules(cfg *ACLInfo) [][]string {
tmpl := template.Must(template.New(proxyChainTemplate).Funcs(template.FuncMap{
"isCgroupSet": func() bool {
return cfg.CgroupMark != ""
},
}).Parse(proxyChainTemplate))
rules, err := extractRulesFromTemplate(tmpl, cfg)
if err != nil {
zap.L().Warn("unable to extract rules", zap.Error(err))
}
return rules
} | [
"func",
"(",
"i",
"*",
"Instance",
")",
"proxyRules",
"(",
"cfg",
"*",
"ACLInfo",
")",
"[",
"]",
"[",
"]",
"string",
"{",
"tmpl",
":=",
"template",
".",
"Must",
"(",
"template",
".",
"New",
"(",
"proxyChainTemplate",
")",
".",
"Funcs",
"(",
"template",
".",
"FuncMap",
"{",
"\"",
"\"",
":",
"func",
"(",
")",
"bool",
"{",
"return",
"cfg",
".",
"CgroupMark",
"!=",
"\"",
"\"",
"\n",
"}",
",",
"}",
")",
".",
"Parse",
"(",
"proxyChainTemplate",
")",
")",
"\n\n",
"rules",
",",
"err",
":=",
"extractRulesFromTemplate",
"(",
"tmpl",
",",
"cfg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Warn",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n",
"return",
"rules",
"\n",
"}"
] | // proxyRules creates the rules that allow traffic to go through if it is handled
// by the services. | [
"proxyRules",
"creates",
"the",
"rules",
"that",
"allow",
"traffic",
"to",
"go",
"through",
"if",
"it",
"is",
"handled",
"by",
"the",
"services",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/supervisor/iptablesctrl/acls.go#L110-L123 |
6,865 | aporeto-inc/trireme-lib | controller/internal/supervisor/iptablesctrl/acls.go | trapRules | func (i *Instance) trapRules(cfg *ACLInfo, isHostPU bool) [][]string {
tmpl := template.Must(template.New(packetCaptureTemplate).Funcs(template.FuncMap{
"needDnsRules": func() bool {
return i.mode == constants.Sidecar || isHostPU || i.isLegacyKernel
},
"isUIDProcess": func() bool {
return cfg.UID != ""
},
}).Parse(packetCaptureTemplate))
rules, err := extractRulesFromTemplate(tmpl, cfg)
if err != nil {
zap.L().Warn("unable to extract rules", zap.Error(err))
}
return rules
} | go | func (i *Instance) trapRules(cfg *ACLInfo, isHostPU bool) [][]string {
tmpl := template.Must(template.New(packetCaptureTemplate).Funcs(template.FuncMap{
"needDnsRules": func() bool {
return i.mode == constants.Sidecar || isHostPU || i.isLegacyKernel
},
"isUIDProcess": func() bool {
return cfg.UID != ""
},
}).Parse(packetCaptureTemplate))
rules, err := extractRulesFromTemplate(tmpl, cfg)
if err != nil {
zap.L().Warn("unable to extract rules", zap.Error(err))
}
return rules
} | [
"func",
"(",
"i",
"*",
"Instance",
")",
"trapRules",
"(",
"cfg",
"*",
"ACLInfo",
",",
"isHostPU",
"bool",
")",
"[",
"]",
"[",
"]",
"string",
"{",
"tmpl",
":=",
"template",
".",
"Must",
"(",
"template",
".",
"New",
"(",
"packetCaptureTemplate",
")",
".",
"Funcs",
"(",
"template",
".",
"FuncMap",
"{",
"\"",
"\"",
":",
"func",
"(",
")",
"bool",
"{",
"return",
"i",
".",
"mode",
"==",
"constants",
".",
"Sidecar",
"||",
"isHostPU",
"||",
"i",
".",
"isLegacyKernel",
"\n",
"}",
",",
"\"",
"\"",
":",
"func",
"(",
")",
"bool",
"{",
"return",
"cfg",
".",
"UID",
"!=",
"\"",
"\"",
"\n",
"}",
",",
"}",
")",
".",
"Parse",
"(",
"packetCaptureTemplate",
")",
")",
"\n\n",
"rules",
",",
"err",
":=",
"extractRulesFromTemplate",
"(",
"tmpl",
",",
"cfg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Warn",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n\n",
"return",
"rules",
"\n",
"}"
] | // trapRules provides the packet capture rules that are defined for each processing unit. | [
"trapRules",
"provides",
"the",
"packet",
"capture",
"rules",
"that",
"are",
"defined",
"for",
"each",
"processing",
"unit",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/supervisor/iptablesctrl/acls.go#L126-L143 |
6,866 | aporeto-inc/trireme-lib | controller/internal/supervisor/iptablesctrl/acls.go | addContainerChain | func (i *Instance) addContainerChain(appChain string, netChain string) error {
if err := i.ipt.NewChain(i.appPacketIPTableContext, appChain); err != nil {
return fmt.Errorf("unable to add chain %s of context %s: %s", appChain, i.appPacketIPTableContext, err)
}
if err := i.ipt.NewChain(i.netPacketIPTableContext, netChain); err != nil {
return fmt.Errorf("unable to add netchain %s of context %s: %s", netChain, i.netPacketIPTableContext, err)
}
return nil
} | go | func (i *Instance) addContainerChain(appChain string, netChain string) error {
if err := i.ipt.NewChain(i.appPacketIPTableContext, appChain); err != nil {
return fmt.Errorf("unable to add chain %s of context %s: %s", appChain, i.appPacketIPTableContext, err)
}
if err := i.ipt.NewChain(i.netPacketIPTableContext, netChain); err != nil {
return fmt.Errorf("unable to add netchain %s of context %s: %s", netChain, i.netPacketIPTableContext, err)
}
return nil
} | [
"func",
"(",
"i",
"*",
"Instance",
")",
"addContainerChain",
"(",
"appChain",
"string",
",",
"netChain",
"string",
")",
"error",
"{",
"if",
"err",
":=",
"i",
".",
"ipt",
".",
"NewChain",
"(",
"i",
".",
"appPacketIPTableContext",
",",
"appChain",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"appChain",
",",
"i",
".",
"appPacketIPTableContext",
",",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"i",
".",
"ipt",
".",
"NewChain",
"(",
"i",
".",
"netPacketIPTableContext",
",",
"netChain",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"netChain",
",",
"i",
".",
"netPacketIPTableContext",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // addContainerChain adds a chain for the specific container and redirects traffic there
// This simplifies significantly the management and makes the iptable rules more readable
// All rules related to a container are contained within the dedicated chain | [
"addContainerChain",
"adds",
"a",
"chain",
"for",
"the",
"specific",
"container",
"and",
"redirects",
"traffic",
"there",
"This",
"simplifies",
"significantly",
"the",
"management",
"and",
"makes",
"the",
"iptable",
"rules",
"more",
"readable",
"All",
"rules",
"related",
"to",
"a",
"container",
"are",
"contained",
"within",
"the",
"dedicated",
"chain"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/supervisor/iptablesctrl/acls.go#L148-L159 |
6,867 | aporeto-inc/trireme-lib | controller/internal/supervisor/iptablesctrl/acls.go | processRulesFromList | func (i *Instance) processRulesFromList(rulelist [][]string, methodType string) error {
var err error
for _, cr := range rulelist {
// HACK: Adding a retry loop to avoid iptables error of "invalid argument"
// Once in a while iptables
L:
for retry := 0; retry < 3; retry++ {
switch methodType {
case "Append":
if err = i.ipt.Append(cr[0], cr[1], cr[2:]...); err == nil {
break L
}
case "Insert":
order, err := strconv.Atoi(cr[2])
if err != nil {
zap.L().Error("Incorrect format for iptables insert")
return errors.New("invalid format")
}
if err = i.ipt.Insert(cr[0], cr[1], order, cr[3:]...); err == nil {
break L
}
case "Delete":
if err = i.ipt.Delete(cr[0], cr[1], cr[2:]...); err == nil {
break L
}
default:
return errors.New("invalid method type")
}
}
if err != nil && methodType != "Delete" {
return fmt.Errorf("unable to %s rule for table %s and chain %s with error %s", methodType, cr[0], cr[1], err)
}
}
return nil
} | go | func (i *Instance) processRulesFromList(rulelist [][]string, methodType string) error {
var err error
for _, cr := range rulelist {
// HACK: Adding a retry loop to avoid iptables error of "invalid argument"
// Once in a while iptables
L:
for retry := 0; retry < 3; retry++ {
switch methodType {
case "Append":
if err = i.ipt.Append(cr[0], cr[1], cr[2:]...); err == nil {
break L
}
case "Insert":
order, err := strconv.Atoi(cr[2])
if err != nil {
zap.L().Error("Incorrect format for iptables insert")
return errors.New("invalid format")
}
if err = i.ipt.Insert(cr[0], cr[1], order, cr[3:]...); err == nil {
break L
}
case "Delete":
if err = i.ipt.Delete(cr[0], cr[1], cr[2:]...); err == nil {
break L
}
default:
return errors.New("invalid method type")
}
}
if err != nil && methodType != "Delete" {
return fmt.Errorf("unable to %s rule for table %s and chain %s with error %s", methodType, cr[0], cr[1], err)
}
}
return nil
} | [
"func",
"(",
"i",
"*",
"Instance",
")",
"processRulesFromList",
"(",
"rulelist",
"[",
"]",
"[",
"]",
"string",
",",
"methodType",
"string",
")",
"error",
"{",
"var",
"err",
"error",
"\n",
"for",
"_",
",",
"cr",
":=",
"range",
"rulelist",
"{",
"// HACK: Adding a retry loop to avoid iptables error of \"invalid argument\"",
"// Once in a while iptables",
"L",
":",
"for",
"retry",
":=",
"0",
";",
"retry",
"<",
"3",
";",
"retry",
"++",
"{",
"switch",
"methodType",
"{",
"case",
"\"",
"\"",
":",
"if",
"err",
"=",
"i",
".",
"ipt",
".",
"Append",
"(",
"cr",
"[",
"0",
"]",
",",
"cr",
"[",
"1",
"]",
",",
"cr",
"[",
"2",
":",
"]",
"...",
")",
";",
"err",
"==",
"nil",
"{",
"break",
"L",
"\n",
"}",
"\n",
"case",
"\"",
"\"",
":",
"order",
",",
"err",
":=",
"strconv",
".",
"Atoi",
"(",
"cr",
"[",
"2",
"]",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
")",
"\n",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"err",
"=",
"i",
".",
"ipt",
".",
"Insert",
"(",
"cr",
"[",
"0",
"]",
",",
"cr",
"[",
"1",
"]",
",",
"order",
",",
"cr",
"[",
"3",
":",
"]",
"...",
")",
";",
"err",
"==",
"nil",
"{",
"break",
"L",
"\n",
"}",
"\n\n",
"case",
"\"",
"\"",
":",
"if",
"err",
"=",
"i",
".",
"ipt",
".",
"Delete",
"(",
"cr",
"[",
"0",
"]",
",",
"cr",
"[",
"1",
"]",
",",
"cr",
"[",
"2",
":",
"]",
"...",
")",
";",
"err",
"==",
"nil",
"{",
"break",
"L",
"\n",
"}",
"\n\n",
"default",
":",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"err",
"!=",
"nil",
"&&",
"methodType",
"!=",
"\"",
"\"",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"methodType",
",",
"cr",
"[",
"0",
"]",
",",
"cr",
"[",
"1",
"]",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // processRulesFromList is a generic helper that parses a set of rules and sends the corresponding
// ACL commands. | [
"processRulesFromList",
"is",
"a",
"generic",
"helper",
"that",
"parses",
"a",
"set",
"of",
"rules",
"and",
"sends",
"the",
"corresponding",
"ACL",
"commands",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/supervisor/iptablesctrl/acls.go#L163-L200 |
6,868 | aporeto-inc/trireme-lib | controller/internal/supervisor/iptablesctrl/acls.go | addPacketTrap | func (i *Instance) addPacketTrap(cfg *ACLInfo, isHostPU bool) error {
return i.processRulesFromList(i.trapRules(cfg, isHostPU), "Append")
} | go | func (i *Instance) addPacketTrap(cfg *ACLInfo, isHostPU bool) error {
return i.processRulesFromList(i.trapRules(cfg, isHostPU), "Append")
} | [
"func",
"(",
"i",
"*",
"Instance",
")",
"addPacketTrap",
"(",
"cfg",
"*",
"ACLInfo",
",",
"isHostPU",
"bool",
")",
"error",
"{",
"return",
"i",
".",
"processRulesFromList",
"(",
"i",
".",
"trapRules",
"(",
"cfg",
",",
"isHostPU",
")",
",",
"\"",
"\"",
")",
"\n",
"}"
] | // addPacketTrap adds the necessary iptables rules to capture control packets to user space | [
"addPacketTrap",
"adds",
"the",
"necessary",
"iptables",
"rules",
"to",
"capture",
"control",
"packets",
"to",
"user",
"space"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/supervisor/iptablesctrl/acls.go#L217-L220 |
6,869 | aporeto-inc/trireme-lib | controller/internal/supervisor/iptablesctrl/acls.go | programExtensionsRules | func (i *Instance) programExtensionsRules(rule *aclIPset, chain, proto, ipMatchDirection string) error {
rulesspec := []string{
"-p", proto,
"-m", "set", "--match-set", rule.ipset, ipMatchDirection,
"--match", "multiport", "--dports", strings.Join(rule.ports, ","),
}
for _, ext := range rule.extensions {
args, err := shellwords.Parse(ext)
if err != nil {
return fmt.Errorf("unable to parse extension %s: %v", ext, err)
}
rulesspec = append(rulesspec, args...)
if err := i.ipt.Append(i.appPacketIPTableContext, chain, rulesspec...); err != nil {
return fmt.Errorf("unable to program extension rules: %v", err)
}
}
return nil
} | go | func (i *Instance) programExtensionsRules(rule *aclIPset, chain, proto, ipMatchDirection string) error {
rulesspec := []string{
"-p", proto,
"-m", "set", "--match-set", rule.ipset, ipMatchDirection,
"--match", "multiport", "--dports", strings.Join(rule.ports, ","),
}
for _, ext := range rule.extensions {
args, err := shellwords.Parse(ext)
if err != nil {
return fmt.Errorf("unable to parse extension %s: %v", ext, err)
}
rulesspec = append(rulesspec, args...)
if err := i.ipt.Append(i.appPacketIPTableContext, chain, rulesspec...); err != nil {
return fmt.Errorf("unable to program extension rules: %v", err)
}
}
return nil
} | [
"func",
"(",
"i",
"*",
"Instance",
")",
"programExtensionsRules",
"(",
"rule",
"*",
"aclIPset",
",",
"chain",
",",
"proto",
",",
"ipMatchDirection",
"string",
")",
"error",
"{",
"rulesspec",
":=",
"[",
"]",
"string",
"{",
"\"",
"\"",
",",
"proto",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"rule",
".",
"ipset",
",",
"ipMatchDirection",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"strings",
".",
"Join",
"(",
"rule",
".",
"ports",
",",
"\"",
"\"",
")",
",",
"}",
"\n\n",
"for",
"_",
",",
"ext",
":=",
"range",
"rule",
".",
"extensions",
"{",
"args",
",",
"err",
":=",
"shellwords",
".",
"Parse",
"(",
"ext",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"ext",
",",
"err",
")",
"\n",
"}",
"\n\n",
"rulesspec",
"=",
"append",
"(",
"rulesspec",
",",
"args",
"...",
")",
"\n\n",
"if",
"err",
":=",
"i",
".",
"ipt",
".",
"Append",
"(",
"i",
".",
"appPacketIPTableContext",
",",
"chain",
",",
"rulesspec",
"...",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // programExtensionsRules programs iptable rules for the given extensions | [
"programExtensionsRules",
"programs",
"iptable",
"rules",
"for",
"the",
"given",
"extensions"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/supervisor/iptablesctrl/acls.go#L298-L320 |
6,870 | aporeto-inc/trireme-lib | controller/internal/supervisor/iptablesctrl/acls.go | sortACLsInBuckets | func (i *Instance) sortACLsInBuckets(contextID, chain string, reverseChain string, rules []aclIPset, isAppACLs bool) *rulesInfo {
rulesBucket := &rulesInfo{
RejectObserveApply: [][]string{},
RejectNotObserved: [][]string{},
RejectObserveContinue: [][]string{},
AcceptObserveApply: [][]string{},
AcceptNotObserved: [][]string{},
AcceptObserveContinue: [][]string{},
ReverseRules: [][]string{},
}
direction := "src"
reverse := "dst"
nflogGroup := "11"
if isAppACLs {
direction = "dst"
reverse = "src"
nflogGroup = "10"
}
for _, rule := range rules {
for _, proto := range rule.protocols {
acls, r := i.generateACLRules(contextID, &rule, chain, reverseChain, nflogGroup, proto, direction, reverse)
rulesBucket.ReverseRules = append(rulesBucket.ReverseRules, r...)
if testReject(rule.policy) && testObserveApply(rule.policy) {
rulesBucket.RejectObserveApply = append(rulesBucket.RejectObserveApply, acls...)
}
if testReject(rule.policy) && testNotObserved(rule.policy) {
rulesBucket.RejectNotObserved = append(rulesBucket.RejectNotObserved, acls...)
}
if testReject(rule.policy) && testObserveContinue(rule.policy) {
rulesBucket.RejectObserveContinue = append(rulesBucket.RejectObserveContinue, acls...)
}
if testAccept(rule.policy) && testObserveContinue(rule.policy) {
rulesBucket.AcceptObserveContinue = append(rulesBucket.AcceptObserveContinue, acls...)
}
if testAccept(rule.policy) && testNotObserved(rule.policy) {
rulesBucket.AcceptNotObserved = append(rulesBucket.AcceptNotObserved, acls...)
}
if testAccept(rule.policy) && testObserveApply(rule.policy) {
rulesBucket.AcceptObserveApply = append(rulesBucket.AcceptObserveApply, acls...)
}
}
}
return rulesBucket
} | go | func (i *Instance) sortACLsInBuckets(contextID, chain string, reverseChain string, rules []aclIPset, isAppACLs bool) *rulesInfo {
rulesBucket := &rulesInfo{
RejectObserveApply: [][]string{},
RejectNotObserved: [][]string{},
RejectObserveContinue: [][]string{},
AcceptObserveApply: [][]string{},
AcceptNotObserved: [][]string{},
AcceptObserveContinue: [][]string{},
ReverseRules: [][]string{},
}
direction := "src"
reverse := "dst"
nflogGroup := "11"
if isAppACLs {
direction = "dst"
reverse = "src"
nflogGroup = "10"
}
for _, rule := range rules {
for _, proto := range rule.protocols {
acls, r := i.generateACLRules(contextID, &rule, chain, reverseChain, nflogGroup, proto, direction, reverse)
rulesBucket.ReverseRules = append(rulesBucket.ReverseRules, r...)
if testReject(rule.policy) && testObserveApply(rule.policy) {
rulesBucket.RejectObserveApply = append(rulesBucket.RejectObserveApply, acls...)
}
if testReject(rule.policy) && testNotObserved(rule.policy) {
rulesBucket.RejectNotObserved = append(rulesBucket.RejectNotObserved, acls...)
}
if testReject(rule.policy) && testObserveContinue(rule.policy) {
rulesBucket.RejectObserveContinue = append(rulesBucket.RejectObserveContinue, acls...)
}
if testAccept(rule.policy) && testObserveContinue(rule.policy) {
rulesBucket.AcceptObserveContinue = append(rulesBucket.AcceptObserveContinue, acls...)
}
if testAccept(rule.policy) && testNotObserved(rule.policy) {
rulesBucket.AcceptNotObserved = append(rulesBucket.AcceptNotObserved, acls...)
}
if testAccept(rule.policy) && testObserveApply(rule.policy) {
rulesBucket.AcceptObserveApply = append(rulesBucket.AcceptObserveApply, acls...)
}
}
}
return rulesBucket
} | [
"func",
"(",
"i",
"*",
"Instance",
")",
"sortACLsInBuckets",
"(",
"contextID",
",",
"chain",
"string",
",",
"reverseChain",
"string",
",",
"rules",
"[",
"]",
"aclIPset",
",",
"isAppACLs",
"bool",
")",
"*",
"rulesInfo",
"{",
"rulesBucket",
":=",
"&",
"rulesInfo",
"{",
"RejectObserveApply",
":",
"[",
"]",
"[",
"]",
"string",
"{",
"}",
",",
"RejectNotObserved",
":",
"[",
"]",
"[",
"]",
"string",
"{",
"}",
",",
"RejectObserveContinue",
":",
"[",
"]",
"[",
"]",
"string",
"{",
"}",
",",
"AcceptObserveApply",
":",
"[",
"]",
"[",
"]",
"string",
"{",
"}",
",",
"AcceptNotObserved",
":",
"[",
"]",
"[",
"]",
"string",
"{",
"}",
",",
"AcceptObserveContinue",
":",
"[",
"]",
"[",
"]",
"string",
"{",
"}",
",",
"ReverseRules",
":",
"[",
"]",
"[",
"]",
"string",
"{",
"}",
",",
"}",
"\n\n",
"direction",
":=",
"\"",
"\"",
"\n",
"reverse",
":=",
"\"",
"\"",
"\n",
"nflogGroup",
":=",
"\"",
"\"",
"\n",
"if",
"isAppACLs",
"{",
"direction",
"=",
"\"",
"\"",
"\n",
"reverse",
"=",
"\"",
"\"",
"\n",
"nflogGroup",
"=",
"\"",
"\"",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"rule",
":=",
"range",
"rules",
"{",
"for",
"_",
",",
"proto",
":=",
"range",
"rule",
".",
"protocols",
"{",
"acls",
",",
"r",
":=",
"i",
".",
"generateACLRules",
"(",
"contextID",
",",
"&",
"rule",
",",
"chain",
",",
"reverseChain",
",",
"nflogGroup",
",",
"proto",
",",
"direction",
",",
"reverse",
")",
"\n",
"rulesBucket",
".",
"ReverseRules",
"=",
"append",
"(",
"rulesBucket",
".",
"ReverseRules",
",",
"r",
"...",
")",
"\n\n",
"if",
"testReject",
"(",
"rule",
".",
"policy",
")",
"&&",
"testObserveApply",
"(",
"rule",
".",
"policy",
")",
"{",
"rulesBucket",
".",
"RejectObserveApply",
"=",
"append",
"(",
"rulesBucket",
".",
"RejectObserveApply",
",",
"acls",
"...",
")",
"\n",
"}",
"\n\n",
"if",
"testReject",
"(",
"rule",
".",
"policy",
")",
"&&",
"testNotObserved",
"(",
"rule",
".",
"policy",
")",
"{",
"rulesBucket",
".",
"RejectNotObserved",
"=",
"append",
"(",
"rulesBucket",
".",
"RejectNotObserved",
",",
"acls",
"...",
")",
"\n",
"}",
"\n\n",
"if",
"testReject",
"(",
"rule",
".",
"policy",
")",
"&&",
"testObserveContinue",
"(",
"rule",
".",
"policy",
")",
"{",
"rulesBucket",
".",
"RejectObserveContinue",
"=",
"append",
"(",
"rulesBucket",
".",
"RejectObserveContinue",
",",
"acls",
"...",
")",
"\n",
"}",
"\n\n",
"if",
"testAccept",
"(",
"rule",
".",
"policy",
")",
"&&",
"testObserveContinue",
"(",
"rule",
".",
"policy",
")",
"{",
"rulesBucket",
".",
"AcceptObserveContinue",
"=",
"append",
"(",
"rulesBucket",
".",
"AcceptObserveContinue",
",",
"acls",
"...",
")",
"\n",
"}",
"\n\n",
"if",
"testAccept",
"(",
"rule",
".",
"policy",
")",
"&&",
"testNotObserved",
"(",
"rule",
".",
"policy",
")",
"{",
"rulesBucket",
".",
"AcceptNotObserved",
"=",
"append",
"(",
"rulesBucket",
".",
"AcceptNotObserved",
",",
"acls",
"...",
")",
"\n",
"}",
"\n\n",
"if",
"testAccept",
"(",
"rule",
".",
"policy",
")",
"&&",
"testObserveApply",
"(",
"rule",
".",
"policy",
")",
"{",
"rulesBucket",
".",
"AcceptObserveApply",
"=",
"append",
"(",
"rulesBucket",
".",
"AcceptObserveApply",
",",
"acls",
"...",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"rulesBucket",
"\n",
"}"
] | // sortACLsInBuckets will process all the rules and add them in a list of buckets
// based on their priority. We need an explicit order of these buckets
// in order to support observation only of ACL actions. The parameters
// must provide the chain and whether it is App or Net ACLs so that the rules
// can be created accordingly. | [
"sortACLsInBuckets",
"will",
"process",
"all",
"the",
"rules",
"and",
"add",
"them",
"in",
"a",
"list",
"of",
"buckets",
"based",
"on",
"their",
"priority",
".",
"We",
"need",
"an",
"explicit",
"order",
"of",
"these",
"buckets",
"in",
"order",
"to",
"support",
"observation",
"only",
"of",
"ACL",
"actions",
".",
"The",
"parameters",
"must",
"provide",
"the",
"chain",
"and",
"whether",
"it",
"is",
"App",
"or",
"Net",
"ACLs",
"so",
"that",
"the",
"rules",
"can",
"be",
"created",
"accordingly",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/supervisor/iptablesctrl/acls.go#L327-L382 |
6,871 | aporeto-inc/trireme-lib | controller/internal/supervisor/iptablesctrl/acls.go | addExternalACLs | func (i *Instance) addExternalACLs(contextID string, chain string, reverseChain string, rules []aclIPset, isAppAcls bool) error {
rulesBucket := i.sortACLsInBuckets(contextID, chain, reverseChain, rules, isAppAcls)
tmpl := template.Must(template.New(acls).Funcs(template.FuncMap{
"joinRule": func(rule []string) string {
return strings.Join(rule, " ")
},
}).Parse(acls))
aclRules, err := extractRulesFromTemplate(tmpl, *rulesBucket)
if err != nil {
return fmt.Errorf("unable to extract rules from template: %s", err)
}
if err := i.processRulesFromList(aclRules, "Append"); err != nil {
return fmt.Errorf("unable to install rules - mode :%s %v", err, isAppAcls)
}
return nil
} | go | func (i *Instance) addExternalACLs(contextID string, chain string, reverseChain string, rules []aclIPset, isAppAcls bool) error {
rulesBucket := i.sortACLsInBuckets(contextID, chain, reverseChain, rules, isAppAcls)
tmpl := template.Must(template.New(acls).Funcs(template.FuncMap{
"joinRule": func(rule []string) string {
return strings.Join(rule, " ")
},
}).Parse(acls))
aclRules, err := extractRulesFromTemplate(tmpl, *rulesBucket)
if err != nil {
return fmt.Errorf("unable to extract rules from template: %s", err)
}
if err := i.processRulesFromList(aclRules, "Append"); err != nil {
return fmt.Errorf("unable to install rules - mode :%s %v", err, isAppAcls)
}
return nil
} | [
"func",
"(",
"i",
"*",
"Instance",
")",
"addExternalACLs",
"(",
"contextID",
"string",
",",
"chain",
"string",
",",
"reverseChain",
"string",
",",
"rules",
"[",
"]",
"aclIPset",
",",
"isAppAcls",
"bool",
")",
"error",
"{",
"rulesBucket",
":=",
"i",
".",
"sortACLsInBuckets",
"(",
"contextID",
",",
"chain",
",",
"reverseChain",
",",
"rules",
",",
"isAppAcls",
")",
"\n\n",
"tmpl",
":=",
"template",
".",
"Must",
"(",
"template",
".",
"New",
"(",
"acls",
")",
".",
"Funcs",
"(",
"template",
".",
"FuncMap",
"{",
"\"",
"\"",
":",
"func",
"(",
"rule",
"[",
"]",
"string",
")",
"string",
"{",
"return",
"strings",
".",
"Join",
"(",
"rule",
",",
"\"",
"\"",
")",
"\n",
"}",
",",
"}",
")",
".",
"Parse",
"(",
"acls",
")",
")",
"\n\n",
"aclRules",
",",
"err",
":=",
"extractRulesFromTemplate",
"(",
"tmpl",
",",
"*",
"rulesBucket",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"i",
".",
"processRulesFromList",
"(",
"aclRules",
",",
"\"",
"\"",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
",",
"isAppAcls",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // addExternalACLs adds a set of rules to the external services that are initiated
// by an application. The allow rules are inserted with highest priority. | [
"addExternalACLs",
"adds",
"a",
"set",
"of",
"rules",
"to",
"the",
"external",
"services",
"that",
"are",
"initiated",
"by",
"an",
"application",
".",
"The",
"allow",
"rules",
"are",
"inserted",
"with",
"highest",
"priority",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/supervisor/iptablesctrl/acls.go#L386-L406 |
6,872 | aporeto-inc/trireme-lib | controller/internal/supervisor/iptablesctrl/acls.go | deleteChainRules | func (i *Instance) deleteChainRules(cfg *ACLInfo) error {
if i.mode != constants.LocalServer {
return i.processRulesFromList(i.containerChainRules(cfg), "Delete")
}
if cfg.UID != "" {
return i.processRulesFromList(i.uidChainRules(cfg), "Delete")
}
return i.processRulesFromList(i.cgroupChainRules(cfg), "Delete")
} | go | func (i *Instance) deleteChainRules(cfg *ACLInfo) error {
if i.mode != constants.LocalServer {
return i.processRulesFromList(i.containerChainRules(cfg), "Delete")
}
if cfg.UID != "" {
return i.processRulesFromList(i.uidChainRules(cfg), "Delete")
}
return i.processRulesFromList(i.cgroupChainRules(cfg), "Delete")
} | [
"func",
"(",
"i",
"*",
"Instance",
")",
"deleteChainRules",
"(",
"cfg",
"*",
"ACLInfo",
")",
"error",
"{",
"if",
"i",
".",
"mode",
"!=",
"constants",
".",
"LocalServer",
"{",
"return",
"i",
".",
"processRulesFromList",
"(",
"i",
".",
"containerChainRules",
"(",
"cfg",
")",
",",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"if",
"cfg",
".",
"UID",
"!=",
"\"",
"\"",
"{",
"return",
"i",
".",
"processRulesFromList",
"(",
"i",
".",
"uidChainRules",
"(",
"cfg",
")",
",",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"i",
".",
"processRulesFromList",
"(",
"i",
".",
"cgroupChainRules",
"(",
"cfg",
")",
",",
"\"",
"\"",
")",
"\n",
"}"
] | // deleteChainRules deletes the rules that send traffic to our chain | [
"deleteChainRules",
"deletes",
"the",
"rules",
"that",
"send",
"traffic",
"to",
"our",
"chain"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/supervisor/iptablesctrl/acls.go#L409-L420 |
6,873 | aporeto-inc/trireme-lib | controller/internal/supervisor/iptablesctrl/acls.go | deletePUChains | func (i *Instance) deletePUChains(appChain, netChain string) error {
if err := i.ipt.ClearChain(i.appPacketIPTableContext, appChain); err != nil {
zap.L().Warn("Failed to clear the container ack packets chain",
zap.String("appChain", appChain),
zap.String("context", i.appPacketIPTableContext),
zap.Error(err),
)
}
if err := i.ipt.DeleteChain(i.appPacketIPTableContext, appChain); err != nil {
zap.L().Warn("Failed to delete the container ack packets chain",
zap.String("appChain", appChain),
zap.String("context", i.appPacketIPTableContext),
zap.Error(err),
)
}
if err := i.ipt.ClearChain(i.netPacketIPTableContext, netChain); err != nil {
zap.L().Warn("Failed to clear the container net packets chain",
zap.String("netChain", netChain),
zap.String("context", i.netPacketIPTableContext),
zap.Error(err),
)
}
if err := i.ipt.DeleteChain(i.netPacketIPTableContext, netChain); err != nil {
zap.L().Warn("Failed to delete the container net packets chain",
zap.String("netChain", netChain),
zap.String("context", i.netPacketIPTableContext),
zap.Error(err),
)
}
return nil
} | go | func (i *Instance) deletePUChains(appChain, netChain string) error {
if err := i.ipt.ClearChain(i.appPacketIPTableContext, appChain); err != nil {
zap.L().Warn("Failed to clear the container ack packets chain",
zap.String("appChain", appChain),
zap.String("context", i.appPacketIPTableContext),
zap.Error(err),
)
}
if err := i.ipt.DeleteChain(i.appPacketIPTableContext, appChain); err != nil {
zap.L().Warn("Failed to delete the container ack packets chain",
zap.String("appChain", appChain),
zap.String("context", i.appPacketIPTableContext),
zap.Error(err),
)
}
if err := i.ipt.ClearChain(i.netPacketIPTableContext, netChain); err != nil {
zap.L().Warn("Failed to clear the container net packets chain",
zap.String("netChain", netChain),
zap.String("context", i.netPacketIPTableContext),
zap.Error(err),
)
}
if err := i.ipt.DeleteChain(i.netPacketIPTableContext, netChain); err != nil {
zap.L().Warn("Failed to delete the container net packets chain",
zap.String("netChain", netChain),
zap.String("context", i.netPacketIPTableContext),
zap.Error(err),
)
}
return nil
} | [
"func",
"(",
"i",
"*",
"Instance",
")",
"deletePUChains",
"(",
"appChain",
",",
"netChain",
"string",
")",
"error",
"{",
"if",
"err",
":=",
"i",
".",
"ipt",
".",
"ClearChain",
"(",
"i",
".",
"appPacketIPTableContext",
",",
"appChain",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Warn",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"appChain",
")",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"i",
".",
"appPacketIPTableContext",
")",
",",
"zap",
".",
"Error",
"(",
"err",
")",
",",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"i",
".",
"ipt",
".",
"DeleteChain",
"(",
"i",
".",
"appPacketIPTableContext",
",",
"appChain",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Warn",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"appChain",
")",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"i",
".",
"appPacketIPTableContext",
")",
",",
"zap",
".",
"Error",
"(",
"err",
")",
",",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"i",
".",
"ipt",
".",
"ClearChain",
"(",
"i",
".",
"netPacketIPTableContext",
",",
"netChain",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Warn",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"netChain",
")",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"i",
".",
"netPacketIPTableContext",
")",
",",
"zap",
".",
"Error",
"(",
"err",
")",
",",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"i",
".",
"ipt",
".",
"DeleteChain",
"(",
"i",
".",
"netPacketIPTableContext",
",",
"netChain",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Warn",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"netChain",
")",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"i",
".",
"netPacketIPTableContext",
")",
",",
"zap",
".",
"Error",
"(",
"err",
")",
",",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // deletePUChains removes all the container specific chains and basic rules | [
"deletePUChains",
"removes",
"all",
"the",
"container",
"specific",
"chains",
"and",
"basic",
"rules"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/supervisor/iptablesctrl/acls.go#L423-L458 |
6,874 | aporeto-inc/trireme-lib | controller/internal/supervisor/iptablesctrl/acls.go | setGlobalRules | func (i *Instance) setGlobalRules() error {
cfg, err := i.newACLInfo(0, "", nil, 0)
if err != nil {
return err
}
tmpl := template.Must(template.New(globalRules).Funcs(template.FuncMap{
"isLocalServer": func() bool {
return i.mode == constants.LocalServer
},
}).Parse(globalRules))
rules, err := extractRulesFromTemplate(tmpl, cfg)
if err != nil {
zap.L().Warn("unable to extract rules", zap.Error(err))
}
if err := i.processRulesFromList(rules, "Append"); err != nil {
return fmt.Errorf("unable to install global rules:%s", err)
}
// nat rules cannot be templated, since they interfere with Docker.
err = i.ipt.Insert(i.appProxyIPTableContext,
ipTableSectionPreRouting, 1,
"-p", "tcp",
"-m", "addrtype", "--dst-type", "LOCAL",
"-m", "set", "!", "--match-set", excludedNetworkSet, "src",
"-j", natProxyInputChain)
if err != nil {
return fmt.Errorf("unable to add default allow for marked packets at net: %s", err)
}
err = i.ipt.Insert(i.appProxyIPTableContext,
ipTableSectionOutput, 1,
"-m", "set", "!", "--match-set", excludedNetworkSet, "dst",
"-j", natProxyOutputChain)
if err != nil {
return fmt.Errorf("unable to add default allow for marked packets at net: %s", err)
}
return nil
} | go | func (i *Instance) setGlobalRules() error {
cfg, err := i.newACLInfo(0, "", nil, 0)
if err != nil {
return err
}
tmpl := template.Must(template.New(globalRules).Funcs(template.FuncMap{
"isLocalServer": func() bool {
return i.mode == constants.LocalServer
},
}).Parse(globalRules))
rules, err := extractRulesFromTemplate(tmpl, cfg)
if err != nil {
zap.L().Warn("unable to extract rules", zap.Error(err))
}
if err := i.processRulesFromList(rules, "Append"); err != nil {
return fmt.Errorf("unable to install global rules:%s", err)
}
// nat rules cannot be templated, since they interfere with Docker.
err = i.ipt.Insert(i.appProxyIPTableContext,
ipTableSectionPreRouting, 1,
"-p", "tcp",
"-m", "addrtype", "--dst-type", "LOCAL",
"-m", "set", "!", "--match-set", excludedNetworkSet, "src",
"-j", natProxyInputChain)
if err != nil {
return fmt.Errorf("unable to add default allow for marked packets at net: %s", err)
}
err = i.ipt.Insert(i.appProxyIPTableContext,
ipTableSectionOutput, 1,
"-m", "set", "!", "--match-set", excludedNetworkSet, "dst",
"-j", natProxyOutputChain)
if err != nil {
return fmt.Errorf("unable to add default allow for marked packets at net: %s", err)
}
return nil
} | [
"func",
"(",
"i",
"*",
"Instance",
")",
"setGlobalRules",
"(",
")",
"error",
"{",
"cfg",
",",
"err",
":=",
"i",
".",
"newACLInfo",
"(",
"0",
",",
"\"",
"\"",
",",
"nil",
",",
"0",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"tmpl",
":=",
"template",
".",
"Must",
"(",
"template",
".",
"New",
"(",
"globalRules",
")",
".",
"Funcs",
"(",
"template",
".",
"FuncMap",
"{",
"\"",
"\"",
":",
"func",
"(",
")",
"bool",
"{",
"return",
"i",
".",
"mode",
"==",
"constants",
".",
"LocalServer",
"\n",
"}",
",",
"}",
")",
".",
"Parse",
"(",
"globalRules",
")",
")",
"\n\n",
"rules",
",",
"err",
":=",
"extractRulesFromTemplate",
"(",
"tmpl",
",",
"cfg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Warn",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"i",
".",
"processRulesFromList",
"(",
"rules",
",",
"\"",
"\"",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"// nat rules cannot be templated, since they interfere with Docker.",
"err",
"=",
"i",
".",
"ipt",
".",
"Insert",
"(",
"i",
".",
"appProxyIPTableContext",
",",
"ipTableSectionPreRouting",
",",
"1",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"excludedNetworkSet",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"natProxyInputChain",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"err",
"=",
"i",
".",
"ipt",
".",
"Insert",
"(",
"i",
".",
"appProxyIPTableContext",
",",
"ipTableSectionOutput",
",",
"1",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"excludedNetworkSet",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"natProxyOutputChain",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // setGlobalRules installs the global rules | [
"setGlobalRules",
"installs",
"the",
"global",
"rules"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/supervisor/iptablesctrl/acls.go#L461-L503 |
6,875 | aporeto-inc/trireme-lib | controller/internal/supervisor/iptablesctrl/acls.go | cleanACLSection | func (i *Instance) cleanACLSection(context, chainPrefix string) {
rules, err := i.ipt.ListChains(context)
if err != nil {
zap.L().Warn("Failed to list chains",
zap.String("context", context),
zap.Error(err),
)
}
for _, rule := range rules {
if strings.Contains(rule, chainPrefix) {
if err := i.ipt.ClearChain(context, rule); err != nil {
zap.L().Warn("Can not clear the chain",
zap.String("context", context),
zap.String("section", rule),
zap.Error(err),
)
}
if err := i.ipt.DeleteChain(context, rule); err != nil {
zap.L().Warn("Can not delete the chain",
zap.String("context", context),
zap.String("section", rule),
zap.Error(err),
)
}
}
}
} | go | func (i *Instance) cleanACLSection(context, chainPrefix string) {
rules, err := i.ipt.ListChains(context)
if err != nil {
zap.L().Warn("Failed to list chains",
zap.String("context", context),
zap.Error(err),
)
}
for _, rule := range rules {
if strings.Contains(rule, chainPrefix) {
if err := i.ipt.ClearChain(context, rule); err != nil {
zap.L().Warn("Can not clear the chain",
zap.String("context", context),
zap.String("section", rule),
zap.Error(err),
)
}
if err := i.ipt.DeleteChain(context, rule); err != nil {
zap.L().Warn("Can not delete the chain",
zap.String("context", context),
zap.String("section", rule),
zap.Error(err),
)
}
}
}
} | [
"func",
"(",
"i",
"*",
"Instance",
")",
"cleanACLSection",
"(",
"context",
",",
"chainPrefix",
"string",
")",
"{",
"rules",
",",
"err",
":=",
"i",
".",
"ipt",
".",
"ListChains",
"(",
"context",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Warn",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"context",
")",
",",
"zap",
".",
"Error",
"(",
"err",
")",
",",
")",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"rule",
":=",
"range",
"rules",
"{",
"if",
"strings",
".",
"Contains",
"(",
"rule",
",",
"chainPrefix",
")",
"{",
"if",
"err",
":=",
"i",
".",
"ipt",
".",
"ClearChain",
"(",
"context",
",",
"rule",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Warn",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"context",
")",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"rule",
")",
",",
"zap",
".",
"Error",
"(",
"err",
")",
",",
")",
"\n",
"}",
"\n",
"if",
"err",
":=",
"i",
".",
"ipt",
".",
"DeleteChain",
"(",
"context",
",",
"rule",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Warn",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"context",
")",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"rule",
")",
",",
"zap",
".",
"Error",
"(",
"err",
")",
",",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // cleanACLSection flushes and deletes all chains with Prefix - Trireme | [
"cleanACLSection",
"flushes",
"and",
"deletes",
"all",
"chains",
"with",
"Prefix",
"-",
"Trireme"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/supervisor/iptablesctrl/acls.go#L574-L603 |
6,876 | aporeto-inc/trireme-lib | policy/mockpolicy/mockpolicy.go | NewMockRuntimeReader | func NewMockRuntimeReader(ctrl *gomock.Controller) *MockRuntimeReader {
mock := &MockRuntimeReader{ctrl: ctrl}
mock.recorder = &MockRuntimeReaderMockRecorder{mock}
return mock
} | go | func NewMockRuntimeReader(ctrl *gomock.Controller) *MockRuntimeReader {
mock := &MockRuntimeReader{ctrl: ctrl}
mock.recorder = &MockRuntimeReaderMockRecorder{mock}
return mock
} | [
"func",
"NewMockRuntimeReader",
"(",
"ctrl",
"*",
"gomock",
".",
"Controller",
")",
"*",
"MockRuntimeReader",
"{",
"mock",
":=",
"&",
"MockRuntimeReader",
"{",
"ctrl",
":",
"ctrl",
"}",
"\n",
"mock",
".",
"recorder",
"=",
"&",
"MockRuntimeReaderMockRecorder",
"{",
"mock",
"}",
"\n",
"return",
"mock",
"\n",
"}"
] | // NewMockRuntimeReader creates a new mock instance
// nolint | [
"NewMockRuntimeReader",
"creates",
"a",
"new",
"mock",
"instance",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/mockpolicy/mockpolicy.go#L32-L36 |
6,877 | aporeto-inc/trireme-lib | policy/mockpolicy/mockpolicy.go | Pid | func (m *MockRuntimeReader) Pid() int {
ret := m.ctrl.Call(m, "Pid")
ret0, _ := ret[0].(int)
return ret0
} | go | func (m *MockRuntimeReader) Pid() int {
ret := m.ctrl.Call(m, "Pid")
ret0, _ := ret[0].(int)
return ret0
} | [
"func",
"(",
"m",
"*",
"MockRuntimeReader",
")",
"Pid",
"(",
")",
"int",
"{",
"ret",
":=",
"m",
".",
"ctrl",
".",
"Call",
"(",
"m",
",",
"\"",
"\"",
")",
"\n",
"ret0",
",",
"_",
":=",
"ret",
"[",
"0",
"]",
".",
"(",
"int",
")",
"\n",
"return",
"ret0",
"\n",
"}"
] | // Pid mocks base method
// nolint | [
"Pid",
"mocks",
"base",
"method",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/mockpolicy/mockpolicy.go#L46-L50 |
6,878 | aporeto-inc/trireme-lib | policy/mockpolicy/mockpolicy.go | Tag | func (m *MockRuntimeReader) Tag(arg0 string) (string, bool) {
ret := m.ctrl.Call(m, "Tag", arg0)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(bool)
return ret0, ret1
} | go | func (m *MockRuntimeReader) Tag(arg0 string) (string, bool) {
ret := m.ctrl.Call(m, "Tag", arg0)
ret0, _ := ret[0].(string)
ret1, _ := ret[1].(bool)
return ret0, ret1
} | [
"func",
"(",
"m",
"*",
"MockRuntimeReader",
")",
"Tag",
"(",
"arg0",
"string",
")",
"(",
"string",
",",
"bool",
")",
"{",
"ret",
":=",
"m",
".",
"ctrl",
".",
"Call",
"(",
"m",
",",
"\"",
"\"",
",",
"arg0",
")",
"\n",
"ret0",
",",
"_",
":=",
"ret",
"[",
"0",
"]",
".",
"(",
"string",
")",
"\n",
"ret1",
",",
"_",
":=",
"ret",
"[",
"1",
"]",
".",
"(",
"bool",
")",
"\n",
"return",
"ret0",
",",
"ret1",
"\n",
"}"
] | // Tag mocks base method
// nolint | [
"Tag",
"mocks",
"base",
"method",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/mockpolicy/mockpolicy.go#L88-L93 |
6,879 | aporeto-inc/trireme-lib | policy/mockpolicy/mockpolicy.go | Tag | func (mr *MockRuntimeReaderMockRecorder) Tag(arg0 interface{}) *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Tag", reflect.TypeOf((*MockRuntimeReader)(nil).Tag), arg0)
} | go | func (mr *MockRuntimeReaderMockRecorder) Tag(arg0 interface{}) *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Tag", reflect.TypeOf((*MockRuntimeReader)(nil).Tag), arg0)
} | [
"func",
"(",
"mr",
"*",
"MockRuntimeReaderMockRecorder",
")",
"Tag",
"(",
"arg0",
"interface",
"{",
"}",
")",
"*",
"gomock",
".",
"Call",
"{",
"return",
"mr",
".",
"mock",
".",
"ctrl",
".",
"RecordCallWithMethodType",
"(",
"mr",
".",
"mock",
",",
"\"",
"\"",
",",
"reflect",
".",
"TypeOf",
"(",
"(",
"*",
"MockRuntimeReader",
")",
"(",
"nil",
")",
".",
"Tag",
")",
",",
"arg0",
")",
"\n",
"}"
] | // Tag indicates an expected call of Tag
// nolint | [
"Tag",
"indicates",
"an",
"expected",
"call",
"of",
"Tag",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/mockpolicy/mockpolicy.go#L97-L99 |
6,880 | aporeto-inc/trireme-lib | policy/mockpolicy/mockpolicy.go | Tags | func (m *MockRuntimeReader) Tags() *policy.TagStore {
ret := m.ctrl.Call(m, "Tags")
ret0, _ := ret[0].(*policy.TagStore)
return ret0
} | go | func (m *MockRuntimeReader) Tags() *policy.TagStore {
ret := m.ctrl.Call(m, "Tags")
ret0, _ := ret[0].(*policy.TagStore)
return ret0
} | [
"func",
"(",
"m",
"*",
"MockRuntimeReader",
")",
"Tags",
"(",
")",
"*",
"policy",
".",
"TagStore",
"{",
"ret",
":=",
"m",
".",
"ctrl",
".",
"Call",
"(",
"m",
",",
"\"",
"\"",
")",
"\n",
"ret0",
",",
"_",
":=",
"ret",
"[",
"0",
"]",
".",
"(",
"*",
"policy",
".",
"TagStore",
")",
"\n",
"return",
"ret0",
"\n",
"}"
] | // Tags mocks base method
// nolint | [
"Tags",
"mocks",
"base",
"method",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/mockpolicy/mockpolicy.go#L103-L107 |
6,881 | aporeto-inc/trireme-lib | policy/mockpolicy/mockpolicy.go | Options | func (m *MockRuntimeReader) Options() policy.OptionsType {
ret := m.ctrl.Call(m, "Options")
ret0, _ := ret[0].(policy.OptionsType)
return ret0
} | go | func (m *MockRuntimeReader) Options() policy.OptionsType {
ret := m.ctrl.Call(m, "Options")
ret0, _ := ret[0].(policy.OptionsType)
return ret0
} | [
"func",
"(",
"m",
"*",
"MockRuntimeReader",
")",
"Options",
"(",
")",
"policy",
".",
"OptionsType",
"{",
"ret",
":=",
"m",
".",
"ctrl",
".",
"Call",
"(",
"m",
",",
"\"",
"\"",
")",
"\n",
"ret0",
",",
"_",
":=",
"ret",
"[",
"0",
"]",
".",
"(",
"policy",
".",
"OptionsType",
")",
"\n",
"return",
"ret0",
"\n",
"}"
] | // Options mocks base method
// nolint | [
"Options",
"mocks",
"base",
"method",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/mockpolicy/mockpolicy.go#L117-L121 |
6,882 | aporeto-inc/trireme-lib | policy/mockpolicy/mockpolicy.go | IPAddresses | func (m *MockRuntimeReader) IPAddresses() policy.ExtendedMap {
ret := m.ctrl.Call(m, "IPAddresses")
ret0, _ := ret[0].(policy.ExtendedMap)
return ret0
} | go | func (m *MockRuntimeReader) IPAddresses() policy.ExtendedMap {
ret := m.ctrl.Call(m, "IPAddresses")
ret0, _ := ret[0].(policy.ExtendedMap)
return ret0
} | [
"func",
"(",
"m",
"*",
"MockRuntimeReader",
")",
"IPAddresses",
"(",
")",
"policy",
".",
"ExtendedMap",
"{",
"ret",
":=",
"m",
".",
"ctrl",
".",
"Call",
"(",
"m",
",",
"\"",
"\"",
")",
"\n",
"ret0",
",",
"_",
":=",
"ret",
"[",
"0",
"]",
".",
"(",
"policy",
".",
"ExtendedMap",
")",
"\n",
"return",
"ret0",
"\n",
"}"
] | // IPAddresses mocks base method
// nolint | [
"IPAddresses",
"mocks",
"base",
"method",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/mockpolicy/mockpolicy.go#L131-L135 |
6,883 | aporeto-inc/trireme-lib | policy/mockpolicy/mockpolicy.go | PUType | func (m *MockRuntimeReader) PUType() common.PUType {
ret := m.ctrl.Call(m, "PUType")
ret0, _ := ret[0].(common.PUType)
return ret0
} | go | func (m *MockRuntimeReader) PUType() common.PUType {
ret := m.ctrl.Call(m, "PUType")
ret0, _ := ret[0].(common.PUType)
return ret0
} | [
"func",
"(",
"m",
"*",
"MockRuntimeReader",
")",
"PUType",
"(",
")",
"common",
".",
"PUType",
"{",
"ret",
":=",
"m",
".",
"ctrl",
".",
"Call",
"(",
"m",
",",
"\"",
"\"",
")",
"\n",
"ret0",
",",
"_",
":=",
"ret",
"[",
"0",
"]",
".",
"(",
"common",
".",
"PUType",
")",
"\n",
"return",
"ret0",
"\n",
"}"
] | // PUType mocks base method
// nolint | [
"PUType",
"mocks",
"base",
"method",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/mockpolicy/mockpolicy.go#L145-L149 |
6,884 | aporeto-inc/trireme-lib | policy/mockpolicy/mockpolicy.go | PUType | func (mr *MockRuntimeReaderMockRecorder) PUType() *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PUType", reflect.TypeOf((*MockRuntimeReader)(nil).PUType))
} | go | func (mr *MockRuntimeReaderMockRecorder) PUType() *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PUType", reflect.TypeOf((*MockRuntimeReader)(nil).PUType))
} | [
"func",
"(",
"mr",
"*",
"MockRuntimeReaderMockRecorder",
")",
"PUType",
"(",
")",
"*",
"gomock",
".",
"Call",
"{",
"return",
"mr",
".",
"mock",
".",
"ctrl",
".",
"RecordCallWithMethodType",
"(",
"mr",
".",
"mock",
",",
"\"",
"\"",
",",
"reflect",
".",
"TypeOf",
"(",
"(",
"*",
"MockRuntimeReader",
")",
"(",
"nil",
")",
".",
"PUType",
")",
")",
"\n",
"}"
] | // PUType indicates an expected call of PUType
// nolint | [
"PUType",
"indicates",
"an",
"expected",
"call",
"of",
"PUType",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/mockpolicy/mockpolicy.go#L153-L155 |
6,885 | aporeto-inc/trireme-lib | policy/mockpolicy/mockpolicy.go | SetServices | func (m *MockRuntimeReader) SetServices(services []common.Service) {
m.ctrl.Call(m, "SetServices", services)
} | go | func (m *MockRuntimeReader) SetServices(services []common.Service) {
m.ctrl.Call(m, "SetServices", services)
} | [
"func",
"(",
"m",
"*",
"MockRuntimeReader",
")",
"SetServices",
"(",
"services",
"[",
"]",
"common",
".",
"Service",
")",
"{",
"m",
".",
"ctrl",
".",
"Call",
"(",
"m",
",",
"\"",
"\"",
",",
"services",
")",
"\n",
"}"
] | // SetServices mocks base method
// nolint | [
"SetServices",
"mocks",
"base",
"method",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/mockpolicy/mockpolicy.go#L159-L161 |
6,886 | aporeto-inc/trireme-lib | policy/mockpolicy/mockpolicy.go | SetServices | func (mr *MockRuntimeReaderMockRecorder) SetServices(services interface{}) *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetServices", reflect.TypeOf((*MockRuntimeReader)(nil).SetServices), services)
} | go | func (mr *MockRuntimeReaderMockRecorder) SetServices(services interface{}) *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetServices", reflect.TypeOf((*MockRuntimeReader)(nil).SetServices), services)
} | [
"func",
"(",
"mr",
"*",
"MockRuntimeReaderMockRecorder",
")",
"SetServices",
"(",
"services",
"interface",
"{",
"}",
")",
"*",
"gomock",
".",
"Call",
"{",
"return",
"mr",
".",
"mock",
".",
"ctrl",
".",
"RecordCallWithMethodType",
"(",
"mr",
".",
"mock",
",",
"\"",
"\"",
",",
"reflect",
".",
"TypeOf",
"(",
"(",
"*",
"MockRuntimeReader",
")",
"(",
"nil",
")",
".",
"SetServices",
")",
",",
"services",
")",
"\n",
"}"
] | // SetServices indicates an expected call of SetServices
// nolint | [
"SetServices",
"indicates",
"an",
"expected",
"call",
"of",
"SetServices",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/mockpolicy/mockpolicy.go#L165-L167 |
6,887 | aporeto-inc/trireme-lib | policy/mockpolicy/mockpolicy.go | PortMap | func (m *MockRuntimeReader) PortMap() map[nat.Port][]string {
ret := m.ctrl.Call(m, "PortMap")
ret0, _ := ret[0].(map[nat.Port][]string)
return ret0
} | go | func (m *MockRuntimeReader) PortMap() map[nat.Port][]string {
ret := m.ctrl.Call(m, "PortMap")
ret0, _ := ret[0].(map[nat.Port][]string)
return ret0
} | [
"func",
"(",
"m",
"*",
"MockRuntimeReader",
")",
"PortMap",
"(",
")",
"map",
"[",
"nat",
".",
"Port",
"]",
"[",
"]",
"string",
"{",
"ret",
":=",
"m",
".",
"ctrl",
".",
"Call",
"(",
"m",
",",
"\"",
"\"",
")",
"\n",
"ret0",
",",
"_",
":=",
"ret",
"[",
"0",
"]",
".",
"(",
"map",
"[",
"nat",
".",
"Port",
"]",
"[",
"]",
"string",
")",
"\n",
"return",
"ret0",
"\n",
"}"
] | // PortMap mocks base method
// nolint | [
"PortMap",
"mocks",
"base",
"method",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/mockpolicy/mockpolicy.go#L171-L175 |
6,888 | aporeto-inc/trireme-lib | policy/mockpolicy/mockpolicy.go | NewMockResolver | func NewMockResolver(ctrl *gomock.Controller) *MockResolver {
mock := &MockResolver{ctrl: ctrl}
mock.recorder = &MockResolverMockRecorder{mock}
return mock
} | go | func NewMockResolver(ctrl *gomock.Controller) *MockResolver {
mock := &MockResolver{ctrl: ctrl}
mock.recorder = &MockResolverMockRecorder{mock}
return mock
} | [
"func",
"NewMockResolver",
"(",
"ctrl",
"*",
"gomock",
".",
"Controller",
")",
"*",
"MockResolver",
"{",
"mock",
":=",
"&",
"MockResolver",
"{",
"ctrl",
":",
"ctrl",
"}",
"\n",
"mock",
".",
"recorder",
"=",
"&",
"MockResolverMockRecorder",
"{",
"mock",
"}",
"\n",
"return",
"mock",
"\n",
"}"
] | // NewMockResolver creates a new mock instance
// nolint | [
"NewMockResolver",
"creates",
"a",
"new",
"mock",
"instance",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/mockpolicy/mockpolicy.go#L198-L202 |
6,889 | aporeto-inc/trireme-lib | policy/mockpolicy/mockpolicy.go | HandlePUEvent | func (m *MockResolver) HandlePUEvent(ctx context.Context, puID string, event common.Event, runtime policy.RuntimeReader) error {
ret := m.ctrl.Call(m, "HandlePUEvent", ctx, puID, event, runtime)
ret0, _ := ret[0].(error)
return ret0
} | go | func (m *MockResolver) HandlePUEvent(ctx context.Context, puID string, event common.Event, runtime policy.RuntimeReader) error {
ret := m.ctrl.Call(m, "HandlePUEvent", ctx, puID, event, runtime)
ret0, _ := ret[0].(error)
return ret0
} | [
"func",
"(",
"m",
"*",
"MockResolver",
")",
"HandlePUEvent",
"(",
"ctx",
"context",
".",
"Context",
",",
"puID",
"string",
",",
"event",
"common",
".",
"Event",
",",
"runtime",
"policy",
".",
"RuntimeReader",
")",
"error",
"{",
"ret",
":=",
"m",
".",
"ctrl",
".",
"Call",
"(",
"m",
",",
"\"",
"\"",
",",
"ctx",
",",
"puID",
",",
"event",
",",
"runtime",
")",
"\n",
"ret0",
",",
"_",
":=",
"ret",
"[",
"0",
"]",
".",
"(",
"error",
")",
"\n",
"return",
"ret0",
"\n",
"}"
] | // HandlePUEvent mocks base method
// nolint | [
"HandlePUEvent",
"mocks",
"base",
"method",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/mockpolicy/mockpolicy.go#L212-L216 |
6,890 | aporeto-inc/trireme-lib | policy/mockpolicy/mockpolicy.go | HandlePUEvent | func (mr *MockResolverMockRecorder) HandlePUEvent(ctx, puID, event, runtime interface{}) *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "HandlePUEvent", reflect.TypeOf((*MockResolver)(nil).HandlePUEvent), ctx, puID, event, runtime)
} | go | func (mr *MockResolverMockRecorder) HandlePUEvent(ctx, puID, event, runtime interface{}) *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "HandlePUEvent", reflect.TypeOf((*MockResolver)(nil).HandlePUEvent), ctx, puID, event, runtime)
} | [
"func",
"(",
"mr",
"*",
"MockResolverMockRecorder",
")",
"HandlePUEvent",
"(",
"ctx",
",",
"puID",
",",
"event",
",",
"runtime",
"interface",
"{",
"}",
")",
"*",
"gomock",
".",
"Call",
"{",
"return",
"mr",
".",
"mock",
".",
"ctrl",
".",
"RecordCallWithMethodType",
"(",
"mr",
".",
"mock",
",",
"\"",
"\"",
",",
"reflect",
".",
"TypeOf",
"(",
"(",
"*",
"MockResolver",
")",
"(",
"nil",
")",
".",
"HandlePUEvent",
")",
",",
"ctx",
",",
"puID",
",",
"event",
",",
"runtime",
")",
"\n",
"}"
] | // HandlePUEvent indicates an expected call of HandlePUEvent
// nolint | [
"HandlePUEvent",
"indicates",
"an",
"expected",
"call",
"of",
"HandlePUEvent",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/mockpolicy/mockpolicy.go#L220-L222 |
6,891 | aporeto-inc/trireme-lib | controller/pkg/tokens/errors.go | Code | func (e *ErrToken) Code() string {
switch e.message {
case errCompressedTagMismatch:
return collector.CompressedTagMismatch
case errDatapathVersionMismatch:
return collector.DatapathVersionMismatch
default:
return collector.InvalidToken
}
} | go | func (e *ErrToken) Code() string {
switch e.message {
case errCompressedTagMismatch:
return collector.CompressedTagMismatch
case errDatapathVersionMismatch:
return collector.DatapathVersionMismatch
default:
return collector.InvalidToken
}
} | [
"func",
"(",
"e",
"*",
"ErrToken",
")",
"Code",
"(",
")",
"string",
"{",
"switch",
"e",
".",
"message",
"{",
"case",
"errCompressedTagMismatch",
":",
"return",
"collector",
".",
"CompressedTagMismatch",
"\n",
"case",
"errDatapathVersionMismatch",
":",
"return",
"collector",
".",
"DatapathVersionMismatch",
"\n",
"default",
":",
"return",
"collector",
".",
"InvalidToken",
"\n",
"}",
"\n",
"}"
] | // Code returns collector reason | [
"Code",
"returns",
"collector",
"reason"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/tokens/errors.go#L29-L39 |
6,892 | aporeto-inc/trireme-lib | controller/pkg/tokens/errors.go | CodeFromErr | func CodeFromErr(err error) string {
errToken, ok := err.(*ErrToken)
if !ok {
return collector.InvalidToken
}
return errToken.Code()
} | go | func CodeFromErr(err error) string {
errToken, ok := err.(*ErrToken)
if !ok {
return collector.InvalidToken
}
return errToken.Code()
} | [
"func",
"CodeFromErr",
"(",
"err",
"error",
")",
"string",
"{",
"errToken",
",",
"ok",
":=",
"err",
".",
"(",
"*",
"ErrToken",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"collector",
".",
"InvalidToken",
"\n",
"}",
"\n\n",
"return",
"errToken",
".",
"Code",
"(",
")",
"\n",
"}"
] | // CodeFromErr returns the collector code from ErrToken | [
"CodeFromErr",
"returns",
"the",
"collector",
"code",
"from",
"ErrToken"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/tokens/errors.go#L42-L50 |
6,893 | aporeto-inc/trireme-lib | controller/internal/enforcer/nfqdatapath/nflog/nflog_linux.go | Run | func (a *nfLog) Run(ctx context.Context) {
a.Lock()
a.srcNflogHandle, _ = nflog.BindAndListenForLogs([]uint16{a.ipv4groupSource}, 64, a.sourceNFLogsHanlder, a.nflogErrorHandler)
a.dstNflogHandle, _ = nflog.BindAndListenForLogs([]uint16{a.ipv4groupDest}, 64, a.destNFLogsHandler, a.nflogErrorHandler)
a.Unlock()
go func() {
<-ctx.Done()
a.Lock()
a.srcNflogHandle.NFlogClose()
a.dstNflogHandle.NFlogClose()
a.Unlock()
}()
} | go | func (a *nfLog) Run(ctx context.Context) {
a.Lock()
a.srcNflogHandle, _ = nflog.BindAndListenForLogs([]uint16{a.ipv4groupSource}, 64, a.sourceNFLogsHanlder, a.nflogErrorHandler)
a.dstNflogHandle, _ = nflog.BindAndListenForLogs([]uint16{a.ipv4groupDest}, 64, a.destNFLogsHandler, a.nflogErrorHandler)
a.Unlock()
go func() {
<-ctx.Done()
a.Lock()
a.srcNflogHandle.NFlogClose()
a.dstNflogHandle.NFlogClose()
a.Unlock()
}()
} | [
"func",
"(",
"a",
"*",
"nfLog",
")",
"Run",
"(",
"ctx",
"context",
".",
"Context",
")",
"{",
"a",
".",
"Lock",
"(",
")",
"\n",
"a",
".",
"srcNflogHandle",
",",
"_",
"=",
"nflog",
".",
"BindAndListenForLogs",
"(",
"[",
"]",
"uint16",
"{",
"a",
".",
"ipv4groupSource",
"}",
",",
"64",
",",
"a",
".",
"sourceNFLogsHanlder",
",",
"a",
".",
"nflogErrorHandler",
")",
"\n",
"a",
".",
"dstNflogHandle",
",",
"_",
"=",
"nflog",
".",
"BindAndListenForLogs",
"(",
"[",
"]",
"uint16",
"{",
"a",
".",
"ipv4groupDest",
"}",
",",
"64",
",",
"a",
".",
"destNFLogsHandler",
",",
"a",
".",
"nflogErrorHandler",
")",
"\n",
"a",
".",
"Unlock",
"(",
")",
"\n\n",
"go",
"func",
"(",
")",
"{",
"<-",
"ctx",
".",
"Done",
"(",
")",
"\n",
"a",
".",
"Lock",
"(",
")",
"\n",
"a",
".",
"srcNflogHandle",
".",
"NFlogClose",
"(",
")",
"\n",
"a",
".",
"dstNflogHandle",
".",
"NFlogClose",
"(",
")",
"\n",
"a",
".",
"Unlock",
"(",
")",
"\n\n",
"}",
"(",
")",
"\n",
"}"
] | // Run runs the Nf Logger | [
"Run",
"runs",
"the",
"Nf",
"Logger"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/nfqdatapath/nflog/nflog_linux.go#L40-L54 |
6,894 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/http/state.go | newAppConnectionState | func newAppConnectionState(nativeID, serviceID string, p *pucontext.PUContext, r *http.Request, originalDestination *net.TCPAddr) *connectionState {
sourceIP := "0.0.0.0/0"
sourcePort := 0
if sourceAddress, err := net.ResolveTCPAddr("tcp", r.RemoteAddr); err == nil {
sourceIP = sourceAddress.IP.String()
sourcePort = sourceAddress.Port
}
return &connectionState{
stats: &collector.FlowRecord{
ContextID: nativeID,
Destination: &collector.EndPoint{
URI: r.Method + " " + r.RequestURI,
HTTPMethod: r.Method,
Type: collector.EndPointTypeExternalIP,
Port: uint16(originalDestination.Port),
IP: originalDestination.IP.String(),
ID: collector.DefaultEndPoint,
},
Source: &collector.EndPoint{
Type: collector.EnpointTypePU,
ID: p.ManagementID(),
IP: sourceIP,
Port: uint16(sourcePort),
HTTPMethod: r.Method,
URI: r.Method + " " + r.RequestURI,
},
Action: policy.Reject,
L4Protocol: packet.IPProtocolTCP,
ServiceType: policy.ServiceHTTP,
ServiceID: serviceID,
Tags: p.Annotations(),
PolicyID: "default",
Count: 1,
},
}
} | go | func newAppConnectionState(nativeID, serviceID string, p *pucontext.PUContext, r *http.Request, originalDestination *net.TCPAddr) *connectionState {
sourceIP := "0.0.0.0/0"
sourcePort := 0
if sourceAddress, err := net.ResolveTCPAddr("tcp", r.RemoteAddr); err == nil {
sourceIP = sourceAddress.IP.String()
sourcePort = sourceAddress.Port
}
return &connectionState{
stats: &collector.FlowRecord{
ContextID: nativeID,
Destination: &collector.EndPoint{
URI: r.Method + " " + r.RequestURI,
HTTPMethod: r.Method,
Type: collector.EndPointTypeExternalIP,
Port: uint16(originalDestination.Port),
IP: originalDestination.IP.String(),
ID: collector.DefaultEndPoint,
},
Source: &collector.EndPoint{
Type: collector.EnpointTypePU,
ID: p.ManagementID(),
IP: sourceIP,
Port: uint16(sourcePort),
HTTPMethod: r.Method,
URI: r.Method + " " + r.RequestURI,
},
Action: policy.Reject,
L4Protocol: packet.IPProtocolTCP,
ServiceType: policy.ServiceHTTP,
ServiceID: serviceID,
Tags: p.Annotations(),
PolicyID: "default",
Count: 1,
},
}
} | [
"func",
"newAppConnectionState",
"(",
"nativeID",
",",
"serviceID",
"string",
",",
"p",
"*",
"pucontext",
".",
"PUContext",
",",
"r",
"*",
"http",
".",
"Request",
",",
"originalDestination",
"*",
"net",
".",
"TCPAddr",
")",
"*",
"connectionState",
"{",
"sourceIP",
":=",
"\"",
"\"",
"\n",
"sourcePort",
":=",
"0",
"\n",
"if",
"sourceAddress",
",",
"err",
":=",
"net",
".",
"ResolveTCPAddr",
"(",
"\"",
"\"",
",",
"r",
".",
"RemoteAddr",
")",
";",
"err",
"==",
"nil",
"{",
"sourceIP",
"=",
"sourceAddress",
".",
"IP",
".",
"String",
"(",
")",
"\n",
"sourcePort",
"=",
"sourceAddress",
".",
"Port",
"\n",
"}",
"\n\n",
"return",
"&",
"connectionState",
"{",
"stats",
":",
"&",
"collector",
".",
"FlowRecord",
"{",
"ContextID",
":",
"nativeID",
",",
"Destination",
":",
"&",
"collector",
".",
"EndPoint",
"{",
"URI",
":",
"r",
".",
"Method",
"+",
"\"",
"\"",
"+",
"r",
".",
"RequestURI",
",",
"HTTPMethod",
":",
"r",
".",
"Method",
",",
"Type",
":",
"collector",
".",
"EndPointTypeExternalIP",
",",
"Port",
":",
"uint16",
"(",
"originalDestination",
".",
"Port",
")",
",",
"IP",
":",
"originalDestination",
".",
"IP",
".",
"String",
"(",
")",
",",
"ID",
":",
"collector",
".",
"DefaultEndPoint",
",",
"}",
",",
"Source",
":",
"&",
"collector",
".",
"EndPoint",
"{",
"Type",
":",
"collector",
".",
"EnpointTypePU",
",",
"ID",
":",
"p",
".",
"ManagementID",
"(",
")",
",",
"IP",
":",
"sourceIP",
",",
"Port",
":",
"uint16",
"(",
"sourcePort",
")",
",",
"HTTPMethod",
":",
"r",
".",
"Method",
",",
"URI",
":",
"r",
".",
"Method",
"+",
"\"",
"\"",
"+",
"r",
".",
"RequestURI",
",",
"}",
",",
"Action",
":",
"policy",
".",
"Reject",
",",
"L4Protocol",
":",
"packet",
".",
"IPProtocolTCP",
",",
"ServiceType",
":",
"policy",
".",
"ServiceHTTP",
",",
"ServiceID",
":",
"serviceID",
",",
"Tags",
":",
"p",
".",
"Annotations",
"(",
")",
",",
"PolicyID",
":",
"\"",
"\"",
",",
"Count",
":",
"1",
",",
"}",
",",
"}",
"\n",
"}"
] | // newAppConnectionState will create the initial connection state object. | [
"newAppConnectionState",
"will",
"create",
"the",
"initial",
"connection",
"state",
"object",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/http/state.go#L22-L59 |
6,895 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/http/state.go | newNetworkConnectionState | func newNetworkConnectionState(nativeID string, pctx *serviceregistry.PortContext, r *http.Request, source, dest *net.TCPAddr) *connectionState {
return &connectionState{
stats: &collector.FlowRecord{
ContextID: nativeID,
Destination: &collector.EndPoint{
ID: pctx.PUContext.ManagementID(),
URI: r.Method + " " + r.RequestURI,
HTTPMethod: r.Method,
Type: collector.EnpointTypePU,
IP: dest.IP.String(),
Port: uint16(dest.Port),
},
Source: &collector.EndPoint{
Type: collector.EndPointTypeExternalIP,
IP: source.IP.String(),
ID: collector.DefaultEndPoint,
Port: uint16(source.Port),
},
Action: policy.Reject,
L4Protocol: packet.IPProtocolTCP,
ServiceType: policy.ServiceHTTP,
PolicyID: "default",
ServiceID: pctx.Service.ID,
Tags: pctx.PUContext.Annotations(),
Count: 1,
},
}
} | go | func newNetworkConnectionState(nativeID string, pctx *serviceregistry.PortContext, r *http.Request, source, dest *net.TCPAddr) *connectionState {
return &connectionState{
stats: &collector.FlowRecord{
ContextID: nativeID,
Destination: &collector.EndPoint{
ID: pctx.PUContext.ManagementID(),
URI: r.Method + " " + r.RequestURI,
HTTPMethod: r.Method,
Type: collector.EnpointTypePU,
IP: dest.IP.String(),
Port: uint16(dest.Port),
},
Source: &collector.EndPoint{
Type: collector.EndPointTypeExternalIP,
IP: source.IP.String(),
ID: collector.DefaultEndPoint,
Port: uint16(source.Port),
},
Action: policy.Reject,
L4Protocol: packet.IPProtocolTCP,
ServiceType: policy.ServiceHTTP,
PolicyID: "default",
ServiceID: pctx.Service.ID,
Tags: pctx.PUContext.Annotations(),
Count: 1,
},
}
} | [
"func",
"newNetworkConnectionState",
"(",
"nativeID",
"string",
",",
"pctx",
"*",
"serviceregistry",
".",
"PortContext",
",",
"r",
"*",
"http",
".",
"Request",
",",
"source",
",",
"dest",
"*",
"net",
".",
"TCPAddr",
")",
"*",
"connectionState",
"{",
"return",
"&",
"connectionState",
"{",
"stats",
":",
"&",
"collector",
".",
"FlowRecord",
"{",
"ContextID",
":",
"nativeID",
",",
"Destination",
":",
"&",
"collector",
".",
"EndPoint",
"{",
"ID",
":",
"pctx",
".",
"PUContext",
".",
"ManagementID",
"(",
")",
",",
"URI",
":",
"r",
".",
"Method",
"+",
"\"",
"\"",
"+",
"r",
".",
"RequestURI",
",",
"HTTPMethod",
":",
"r",
".",
"Method",
",",
"Type",
":",
"collector",
".",
"EnpointTypePU",
",",
"IP",
":",
"dest",
".",
"IP",
".",
"String",
"(",
")",
",",
"Port",
":",
"uint16",
"(",
"dest",
".",
"Port",
")",
",",
"}",
",",
"Source",
":",
"&",
"collector",
".",
"EndPoint",
"{",
"Type",
":",
"collector",
".",
"EndPointTypeExternalIP",
",",
"IP",
":",
"source",
".",
"IP",
".",
"String",
"(",
")",
",",
"ID",
":",
"collector",
".",
"DefaultEndPoint",
",",
"Port",
":",
"uint16",
"(",
"source",
".",
"Port",
")",
",",
"}",
",",
"Action",
":",
"policy",
".",
"Reject",
",",
"L4Protocol",
":",
"packet",
".",
"IPProtocolTCP",
",",
"ServiceType",
":",
"policy",
".",
"ServiceHTTP",
",",
"PolicyID",
":",
"\"",
"\"",
",",
"ServiceID",
":",
"pctx",
".",
"Service",
".",
"ID",
",",
"Tags",
":",
"pctx",
".",
"PUContext",
".",
"Annotations",
"(",
")",
",",
"Count",
":",
"1",
",",
"}",
",",
"}",
"\n",
"}"
] | // newNetworkConnectionState will create the initial connection state object. | [
"newNetworkConnectionState",
"will",
"create",
"the",
"initial",
"connection",
"state",
"object",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/http/state.go#L62-L89 |
6,896 | aporeto-inc/trireme-lib | monitor/internal/cni/extractor.go | KubernetesMetadataExtractor | func KubernetesMetadataExtractor(event *common.EventInfo) (*policy.PURuntime, error) {
if event.NS == "" {
return nil, errors.New("namespace path is required when using cni")
}
runtimeTags := policy.NewTagStore()
for _, tag := range event.Tags {
parts := strings.Split(tag, "=")
if len(parts) != 2 {
return nil, fmt.Errorf("invalid tag: %s", tag)
}
runtimeTags.AppendKeyValue("@usr:"+parts[0], parts[1])
}
runtimeIps := policy.ExtendedMap{"bridge": "0.0.0.0/0"}
return policy.NewPURuntime(event.Name, 1, "", runtimeTags, runtimeIps, common.LinuxProcessPU, nil), nil
} | go | func KubernetesMetadataExtractor(event *common.EventInfo) (*policy.PURuntime, error) {
if event.NS == "" {
return nil, errors.New("namespace path is required when using cni")
}
runtimeTags := policy.NewTagStore()
for _, tag := range event.Tags {
parts := strings.Split(tag, "=")
if len(parts) != 2 {
return nil, fmt.Errorf("invalid tag: %s", tag)
}
runtimeTags.AppendKeyValue("@usr:"+parts[0], parts[1])
}
runtimeIps := policy.ExtendedMap{"bridge": "0.0.0.0/0"}
return policy.NewPURuntime(event.Name, 1, "", runtimeTags, runtimeIps, common.LinuxProcessPU, nil), nil
} | [
"func",
"KubernetesMetadataExtractor",
"(",
"event",
"*",
"common",
".",
"EventInfo",
")",
"(",
"*",
"policy",
".",
"PURuntime",
",",
"error",
")",
"{",
"if",
"event",
".",
"NS",
"==",
"\"",
"\"",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"runtimeTags",
":=",
"policy",
".",
"NewTagStore",
"(",
")",
"\n",
"for",
"_",
",",
"tag",
":=",
"range",
"event",
".",
"Tags",
"{",
"parts",
":=",
"strings",
".",
"Split",
"(",
"tag",
",",
"\"",
"\"",
")",
"\n",
"if",
"len",
"(",
"parts",
")",
"!=",
"2",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"tag",
")",
"\n",
"}",
"\n",
"runtimeTags",
".",
"AppendKeyValue",
"(",
"\"",
"\"",
"+",
"parts",
"[",
"0",
"]",
",",
"parts",
"[",
"1",
"]",
")",
"\n",
"}",
"\n\n",
"runtimeIps",
":=",
"policy",
".",
"ExtendedMap",
"{",
"\"",
"\"",
":",
"\"",
"\"",
"}",
"\n\n",
"return",
"policy",
".",
"NewPURuntime",
"(",
"event",
".",
"Name",
",",
"1",
",",
"\"",
"\"",
",",
"runtimeTags",
",",
"runtimeIps",
",",
"common",
".",
"LinuxProcessPU",
",",
"nil",
")",
",",
"nil",
"\n",
"}"
] | // KubernetesMetadataExtractor is a systemd based metadata extractor | [
"KubernetesMetadataExtractor",
"is",
"a",
"systemd",
"based",
"metadata",
"extractor"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/cni/extractor.go#L13-L31 |
6,897 | aporeto-inc/trireme-lib | controller/pkg/cleaner/cleaner.go | CleanAllTriremeACLs | func CleanAllTriremeACLs() error {
ipt, err := iptablesctrl.NewInstance(fqconfig.NewFilterQueueWithDefaults(), constants.LocalServer, &runtime.Configuration{})
if err != nil {
return fmt.Errorf("unable to initialize cleaning iptables controller: %s", err)
}
return ipt.CleanUp()
} | go | func CleanAllTriremeACLs() error {
ipt, err := iptablesctrl.NewInstance(fqconfig.NewFilterQueueWithDefaults(), constants.LocalServer, &runtime.Configuration{})
if err != nil {
return fmt.Errorf("unable to initialize cleaning iptables controller: %s", err)
}
return ipt.CleanUp()
} | [
"func",
"CleanAllTriremeACLs",
"(",
")",
"error",
"{",
"ipt",
",",
"err",
":=",
"iptablesctrl",
".",
"NewInstance",
"(",
"fqconfig",
".",
"NewFilterQueueWithDefaults",
"(",
")",
",",
"constants",
".",
"LocalServer",
",",
"&",
"runtime",
".",
"Configuration",
"{",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"ipt",
".",
"CleanUp",
"(",
")",
"\n",
"}"
] | // CleanAllTriremeACLs cleans up all previous Trireme ACLs. It can be called from
// other packages for housekeeping. | [
"CleanAllTriremeACLs",
"cleans",
"up",
"all",
"previous",
"Trireme",
"ACLs",
".",
"It",
"can",
"be",
"called",
"from",
"other",
"packages",
"for",
"housekeeping",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/cleaner/cleaner.go#L14-L21 |
6,898 | aporeto-inc/trireme-lib | policy/types.go | ActionString | func (f ActionType) ActionString() string {
if f.Accepted() && !f.Rejected() {
return actionAccept
}
if !f.Accepted() && f.Rejected() {
return actionReject
}
return actionPassthrough
} | go | func (f ActionType) ActionString() string {
if f.Accepted() && !f.Rejected() {
return actionAccept
}
if !f.Accepted() && f.Rejected() {
return actionReject
}
return actionPassthrough
} | [
"func",
"(",
"f",
"ActionType",
")",
"ActionString",
"(",
")",
"string",
"{",
"if",
"f",
".",
"Accepted",
"(",
")",
"&&",
"!",
"f",
".",
"Rejected",
"(",
")",
"{",
"return",
"actionAccept",
"\n",
"}",
"\n\n",
"if",
"!",
"f",
".",
"Accepted",
"(",
")",
"&&",
"f",
".",
"Rejected",
"(",
")",
"{",
"return",
"actionReject",
"\n",
"}",
"\n\n",
"return",
"actionPassthrough",
"\n",
"}"
] | // ActionString returns if the action if accepted of rejected as a long string. | [
"ActionString",
"returns",
"if",
"the",
"action",
"if",
"accepted",
"of",
"rejected",
"as",
"a",
"long",
"string",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/types.go#L73-L83 |
6,899 | aporeto-inc/trireme-lib | policy/types.go | LogPrefix | func (f *FlowPolicy) LogPrefix(contextID string) string {
prefix := contextID + ":" + f.PolicyID + ":" + f.ServiceID + f.EncodedActionString()
return prefix
} | go | func (f *FlowPolicy) LogPrefix(contextID string) string {
prefix := contextID + ":" + f.PolicyID + ":" + f.ServiceID + f.EncodedActionString()
return prefix
} | [
"func",
"(",
"f",
"*",
"FlowPolicy",
")",
"LogPrefix",
"(",
"contextID",
"string",
")",
"string",
"{",
"prefix",
":=",
"contextID",
"+",
"\"",
"\"",
"+",
"f",
".",
"PolicyID",
"+",
"\"",
"\"",
"+",
"f",
".",
"ServiceID",
"+",
"f",
".",
"EncodedActionString",
"(",
")",
"\n",
"return",
"prefix",
"\n",
"}"
] | // LogPrefix is the prefix used in nf-log action. It must be less than | [
"LogPrefix",
"is",
"the",
"prefix",
"used",
"in",
"nf",
"-",
"log",
"action",
".",
"It",
"must",
"be",
"less",
"than"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/types.go#L170-L173 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.