id
int32 0
167k
| repo
stringlengths 5
54
| path
stringlengths 4
155
| func_name
stringlengths 1
118
| original_string
stringlengths 52
85.5k
| language
stringclasses 1
value | code
stringlengths 52
85.5k
| code_tokens
sequencelengths 21
1.41k
| docstring
stringlengths 6
2.61k
| docstring_tokens
sequencelengths 3
215
| sha
stringlengths 40
40
| url
stringlengths 85
252
|
---|---|---|---|---|---|---|---|---|---|---|---|
7,000 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/serviceregistry/serviceregistry.go | Unregister | func (r *Registry) Unregister(puID string) error {
r.Lock()
defer r.Unlock()
delete(r.indexByName, puID)
r.indexByPort.DeleteByID(puID, true)
r.indexByPort.DeleteByID(puID, false)
return nil
} | go | func (r *Registry) Unregister(puID string) error {
r.Lock()
defer r.Unlock()
delete(r.indexByName, puID)
r.indexByPort.DeleteByID(puID, true)
r.indexByPort.DeleteByID(puID, false)
return nil
} | [
"func",
"(",
"r",
"*",
"Registry",
")",
"Unregister",
"(",
"puID",
"string",
")",
"error",
"{",
"r",
".",
"Lock",
"(",
")",
"\n",
"defer",
"r",
".",
"Unlock",
"(",
")",
"\n\n",
"delete",
"(",
"r",
".",
"indexByName",
",",
"puID",
")",
"\n",
"r",
".",
"indexByPort",
".",
"DeleteByID",
"(",
"puID",
",",
"true",
")",
"\n",
"r",
".",
"indexByPort",
".",
"DeleteByID",
"(",
"puID",
",",
"false",
")",
"\n",
"return",
"nil",
"\n",
"}"
] | // Unregister unregisters a pu from the registry. | [
"Unregister",
"unregisters",
"a",
"pu",
"from",
"the",
"registry",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/serviceregistry/serviceregistry.go#L114-L122 |
7,001 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/serviceregistry/serviceregistry.go | RetrieveServiceByID | func (r *Registry) RetrieveServiceByID(id string) (*ServiceContext, error) {
r.Lock()
defer r.Unlock()
svc, ok := r.indexByName[id]
if !ok {
return nil, fmt.Errorf("Service not found: %s", id)
}
return svc, nil
} | go | func (r *Registry) RetrieveServiceByID(id string) (*ServiceContext, error) {
r.Lock()
defer r.Unlock()
svc, ok := r.indexByName[id]
if !ok {
return nil, fmt.Errorf("Service not found: %s", id)
}
return svc, nil
} | [
"func",
"(",
"r",
"*",
"Registry",
")",
"RetrieveServiceByID",
"(",
"id",
"string",
")",
"(",
"*",
"ServiceContext",
",",
"error",
")",
"{",
"r",
".",
"Lock",
"(",
")",
"\n",
"defer",
"r",
".",
"Unlock",
"(",
")",
"\n\n",
"svc",
",",
"ok",
":=",
"r",
".",
"indexByName",
"[",
"id",
"]",
"\n",
"if",
"!",
"ok",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"id",
")",
"\n",
"}",
"\n\n",
"return",
"svc",
",",
"nil",
"\n",
"}"
] | // RetrieveServiceByID retrieves a service by the PU ID. Returns error if not found. | [
"RetrieveServiceByID",
"retrieves",
"a",
"service",
"by",
"the",
"PU",
"ID",
".",
"Returns",
"error",
"if",
"not",
"found",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/serviceregistry/serviceregistry.go#L125-L135 |
7,002 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/serviceregistry/serviceregistry.go | RetrieveExposedServiceContext | func (r *Registry) RetrieveExposedServiceContext(ip net.IP, port int, host string) (*PortContext, error) {
r.Lock()
defer r.Unlock()
data := r.indexByPort.Find(ip, port, host, true)
if data == nil {
return nil, fmt.Errorf("Service information not found: %s %d %s", ip.String(), port, host)
}
portContext, ok := data.(*PortContext)
if !ok {
return nil, fmt.Errorf("Internal server error")
}
return portContext, nil
} | go | func (r *Registry) RetrieveExposedServiceContext(ip net.IP, port int, host string) (*PortContext, error) {
r.Lock()
defer r.Unlock()
data := r.indexByPort.Find(ip, port, host, true)
if data == nil {
return nil, fmt.Errorf("Service information not found: %s %d %s", ip.String(), port, host)
}
portContext, ok := data.(*PortContext)
if !ok {
return nil, fmt.Errorf("Internal server error")
}
return portContext, nil
} | [
"func",
"(",
"r",
"*",
"Registry",
")",
"RetrieveExposedServiceContext",
"(",
"ip",
"net",
".",
"IP",
",",
"port",
"int",
",",
"host",
"string",
")",
"(",
"*",
"PortContext",
",",
"error",
")",
"{",
"r",
".",
"Lock",
"(",
")",
"\n",
"defer",
"r",
".",
"Unlock",
"(",
")",
"\n\n",
"data",
":=",
"r",
".",
"indexByPort",
".",
"Find",
"(",
"ip",
",",
"port",
",",
"host",
",",
"true",
")",
"\n",
"if",
"data",
"==",
"nil",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"ip",
".",
"String",
"(",
")",
",",
"port",
",",
"host",
")",
"\n",
"}",
"\n\n",
"portContext",
",",
"ok",
":=",
"data",
".",
"(",
"*",
"PortContext",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"portContext",
",",
"nil",
"\n",
"}"
] | // RetrieveExposedServiceContext retrieves a service by the provided IP and or port. This
// is called by the network side of processing to find the context. | [
"RetrieveExposedServiceContext",
"retrieves",
"a",
"service",
"by",
"the",
"provided",
"IP",
"and",
"or",
"port",
".",
"This",
"is",
"called",
"by",
"the",
"network",
"side",
"of",
"processing",
"to",
"find",
"the",
"context",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/serviceregistry/serviceregistry.go#L139-L154 |
7,003 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/serviceregistry/serviceregistry.go | updateExposedPortAssociations | func (r *Registry) updateExposedPortAssociations(sctx *ServiceContext, service *policy.ApplicationService, secrets secrets.Secrets) error {
// Do All the basic validations first.
if service.PrivateNetworkInfo == nil {
return fmt.Errorf("Private network is required for exposed services")
}
port, err := service.PrivateNetworkInfo.Ports.SinglePort()
if err != nil {
return fmt.Errorf("Multi-port is not supported for exposed services: %s", err)
}
if service.PublicNetworkInfo != nil {
if _, err := service.PublicNetworkInfo.Ports.SinglePort(); err != nil {
return fmt.Errorf("Multi-port is not supported for public network services: %s", err)
}
}
// Find any existing state and get the authorizer. We do not want
// to re-initialize the authorizer for every policy update.
authProcessor, err := r.createOrUpdateAuthProcessor(sctx, service, secrets)
if err != nil {
return err
}
clientCAs := x509.NewCertPool()
if (service.UserAuthorizationType == policy.UserAuthorizationMutualTLS || service.UserAuthorizationType == policy.UserAuthorizationJWT) &&
len(service.MutualTLSTrustedRoots) > 0 {
if !clientCAs.AppendCertsFromPEM(service.MutualTLSTrustedRoots) {
return fmt.Errorf("Unable to process client CAs")
}
}
// Add the new references.
if err := r.indexByPort.Add(
service.PrivateNetworkInfo,
sctx.PU.ContextID,
&PortContext{
ID: sctx.PU.ContextID,
Service: service,
TargetPort: int(port),
Type: serviceTypeToNetworkListenerType(service.Type, false),
Authorizer: authProcessor,
ClientTrustedRoots: clientCAs,
PUContext: sctx.PUContext,
},
true,
); err != nil {
return fmt.Errorf("Possible port overlap: %s", err)
}
if service.Type == policy.ServiceHTTP && service.PublicNetworkInfo != nil {
if err := r.indexByPort.Add(
service.PublicNetworkInfo,
sctx.PU.ContextID,
&PortContext{
ID: sctx.PU.ContextID,
Service: service,
TargetPort: int(port),
Type: serviceTypeToNetworkListenerType(service.Type, service.PublicServiceNoTLS),
Authorizer: authProcessor,
ClientTrustedRoots: clientCAs,
PUContext: sctx.PUContext,
},
true,
); err != nil {
return fmt.Errorf("Possible port overlap with public services: %s", err)
}
}
return nil
} | go | func (r *Registry) updateExposedPortAssociations(sctx *ServiceContext, service *policy.ApplicationService, secrets secrets.Secrets) error {
// Do All the basic validations first.
if service.PrivateNetworkInfo == nil {
return fmt.Errorf("Private network is required for exposed services")
}
port, err := service.PrivateNetworkInfo.Ports.SinglePort()
if err != nil {
return fmt.Errorf("Multi-port is not supported for exposed services: %s", err)
}
if service.PublicNetworkInfo != nil {
if _, err := service.PublicNetworkInfo.Ports.SinglePort(); err != nil {
return fmt.Errorf("Multi-port is not supported for public network services: %s", err)
}
}
// Find any existing state and get the authorizer. We do not want
// to re-initialize the authorizer for every policy update.
authProcessor, err := r.createOrUpdateAuthProcessor(sctx, service, secrets)
if err != nil {
return err
}
clientCAs := x509.NewCertPool()
if (service.UserAuthorizationType == policy.UserAuthorizationMutualTLS || service.UserAuthorizationType == policy.UserAuthorizationJWT) &&
len(service.MutualTLSTrustedRoots) > 0 {
if !clientCAs.AppendCertsFromPEM(service.MutualTLSTrustedRoots) {
return fmt.Errorf("Unable to process client CAs")
}
}
// Add the new references.
if err := r.indexByPort.Add(
service.PrivateNetworkInfo,
sctx.PU.ContextID,
&PortContext{
ID: sctx.PU.ContextID,
Service: service,
TargetPort: int(port),
Type: serviceTypeToNetworkListenerType(service.Type, false),
Authorizer: authProcessor,
ClientTrustedRoots: clientCAs,
PUContext: sctx.PUContext,
},
true,
); err != nil {
return fmt.Errorf("Possible port overlap: %s", err)
}
if service.Type == policy.ServiceHTTP && service.PublicNetworkInfo != nil {
if err := r.indexByPort.Add(
service.PublicNetworkInfo,
sctx.PU.ContextID,
&PortContext{
ID: sctx.PU.ContextID,
Service: service,
TargetPort: int(port),
Type: serviceTypeToNetworkListenerType(service.Type, service.PublicServiceNoTLS),
Authorizer: authProcessor,
ClientTrustedRoots: clientCAs,
PUContext: sctx.PUContext,
},
true,
); err != nil {
return fmt.Errorf("Possible port overlap with public services: %s", err)
}
}
return nil
} | [
"func",
"(",
"r",
"*",
"Registry",
")",
"updateExposedPortAssociations",
"(",
"sctx",
"*",
"ServiceContext",
",",
"service",
"*",
"policy",
".",
"ApplicationService",
",",
"secrets",
"secrets",
".",
"Secrets",
")",
"error",
"{",
"// Do All the basic validations first.",
"if",
"service",
".",
"PrivateNetworkInfo",
"==",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"port",
",",
"err",
":=",
"service",
".",
"PrivateNetworkInfo",
".",
"Ports",
".",
"SinglePort",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"if",
"service",
".",
"PublicNetworkInfo",
"!=",
"nil",
"{",
"if",
"_",
",",
"err",
":=",
"service",
".",
"PublicNetworkInfo",
".",
"Ports",
".",
"SinglePort",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"// Find any existing state and get the authorizer. We do not want",
"// to re-initialize the authorizer for every policy update.",
"authProcessor",
",",
"err",
":=",
"r",
".",
"createOrUpdateAuthProcessor",
"(",
"sctx",
",",
"service",
",",
"secrets",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"clientCAs",
":=",
"x509",
".",
"NewCertPool",
"(",
")",
"\n",
"if",
"(",
"service",
".",
"UserAuthorizationType",
"==",
"policy",
".",
"UserAuthorizationMutualTLS",
"||",
"service",
".",
"UserAuthorizationType",
"==",
"policy",
".",
"UserAuthorizationJWT",
")",
"&&",
"len",
"(",
"service",
".",
"MutualTLSTrustedRoots",
")",
">",
"0",
"{",
"if",
"!",
"clientCAs",
".",
"AppendCertsFromPEM",
"(",
"service",
".",
"MutualTLSTrustedRoots",
")",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"// Add the new references.",
"if",
"err",
":=",
"r",
".",
"indexByPort",
".",
"Add",
"(",
"service",
".",
"PrivateNetworkInfo",
",",
"sctx",
".",
"PU",
".",
"ContextID",
",",
"&",
"PortContext",
"{",
"ID",
":",
"sctx",
".",
"PU",
".",
"ContextID",
",",
"Service",
":",
"service",
",",
"TargetPort",
":",
"int",
"(",
"port",
")",
",",
"Type",
":",
"serviceTypeToNetworkListenerType",
"(",
"service",
".",
"Type",
",",
"false",
")",
",",
"Authorizer",
":",
"authProcessor",
",",
"ClientTrustedRoots",
":",
"clientCAs",
",",
"PUContext",
":",
"sctx",
".",
"PUContext",
",",
"}",
",",
"true",
",",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"service",
".",
"Type",
"==",
"policy",
".",
"ServiceHTTP",
"&&",
"service",
".",
"PublicNetworkInfo",
"!=",
"nil",
"{",
"if",
"err",
":=",
"r",
".",
"indexByPort",
".",
"Add",
"(",
"service",
".",
"PublicNetworkInfo",
",",
"sctx",
".",
"PU",
".",
"ContextID",
",",
"&",
"PortContext",
"{",
"ID",
":",
"sctx",
".",
"PU",
".",
"ContextID",
",",
"Service",
":",
"service",
",",
"TargetPort",
":",
"int",
"(",
"port",
")",
",",
"Type",
":",
"serviceTypeToNetworkListenerType",
"(",
"service",
".",
"Type",
",",
"service",
".",
"PublicServiceNoTLS",
")",
",",
"Authorizer",
":",
"authProcessor",
",",
"ClientTrustedRoots",
":",
"clientCAs",
",",
"PUContext",
":",
"sctx",
".",
"PUContext",
",",
"}",
",",
"true",
",",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // updateExposedPortAssociations will insert the association between a port
// and a service in the global exposed service cache. This is needed
// for all incoming connections, so that can determine both the type
// of proxy as well the correct policy for this connection. This
// association cannot have overlaps. | [
"updateExposedPortAssociations",
"will",
"insert",
"the",
"association",
"between",
"a",
"port",
"and",
"a",
"service",
"in",
"the",
"global",
"exposed",
"service",
"cache",
".",
"This",
"is",
"needed",
"for",
"all",
"incoming",
"connections",
"so",
"that",
"can",
"determine",
"both",
"the",
"type",
"of",
"proxy",
"as",
"well",
"the",
"correct",
"policy",
"for",
"this",
"connection",
".",
"This",
"association",
"cannot",
"have",
"overlaps",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/serviceregistry/serviceregistry.go#L179-L248 |
7,004 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/serviceregistry/serviceregistry.go | updateExposedServices | func (r *Registry) updateExposedServices(sctx *ServiceContext, secrets secrets.Secrets) error {
for _, service := range sctx.PU.Policy.ExposedServices() {
if service.Type != policy.ServiceHTTP && service.Type != policy.ServiceTCP {
continue
}
if err := r.updateExposedPortAssociations(sctx, service, secrets); err != nil {
return err
}
}
return nil
} | go | func (r *Registry) updateExposedServices(sctx *ServiceContext, secrets secrets.Secrets) error {
for _, service := range sctx.PU.Policy.ExposedServices() {
if service.Type != policy.ServiceHTTP && service.Type != policy.ServiceTCP {
continue
}
if err := r.updateExposedPortAssociations(sctx, service, secrets); err != nil {
return err
}
}
return nil
} | [
"func",
"(",
"r",
"*",
"Registry",
")",
"updateExposedServices",
"(",
"sctx",
"*",
"ServiceContext",
",",
"secrets",
"secrets",
".",
"Secrets",
")",
"error",
"{",
"for",
"_",
",",
"service",
":=",
"range",
"sctx",
".",
"PU",
".",
"Policy",
".",
"ExposedServices",
"(",
")",
"{",
"if",
"service",
".",
"Type",
"!=",
"policy",
".",
"ServiceHTTP",
"&&",
"service",
".",
"Type",
"!=",
"policy",
".",
"ServiceTCP",
"{",
"continue",
"\n",
"}",
"\n",
"if",
"err",
":=",
"r",
".",
"updateExposedPortAssociations",
"(",
"sctx",
",",
"service",
",",
"secrets",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // buildExposedServices builds the caches for the exposed services. It assumes that an authorization | [
"buildExposedServices",
"builds",
"the",
"caches",
"for",
"the",
"exposed",
"services",
".",
"It",
"assumes",
"that",
"an",
"authorization"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/serviceregistry/serviceregistry.go#L251-L263 |
7,005 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/serviceregistry/serviceregistry.go | updateDependentServices | func (r *Registry) updateDependentServices(sctx *ServiceContext) error {
for _, service := range sctx.PU.Policy.DependentServices() {
if len(service.CACert) != 0 {
sctx.RootCA = append(sctx.RootCA, service.CACert)
}
serviceData := &DependentServiceData{
ServiceType: serviceTypeToApplicationListenerType(service.Type),
}
if service.Type == policy.ServiceHTTP {
serviceData.APICache = urisearch.NewAPICache(service.HTTPRules, service.ID, service.External)
}
if err := sctx.dependentServiceCache.Add(
service.NetworkInfo,
sctx.PU.ContextID,
serviceData,
false,
); err != nil {
return fmt.Errorf("Possible overlap in dependent services: %s", err)
}
}
return nil
} | go | func (r *Registry) updateDependentServices(sctx *ServiceContext) error {
for _, service := range sctx.PU.Policy.DependentServices() {
if len(service.CACert) != 0 {
sctx.RootCA = append(sctx.RootCA, service.CACert)
}
serviceData := &DependentServiceData{
ServiceType: serviceTypeToApplicationListenerType(service.Type),
}
if service.Type == policy.ServiceHTTP {
serviceData.APICache = urisearch.NewAPICache(service.HTTPRules, service.ID, service.External)
}
if err := sctx.dependentServiceCache.Add(
service.NetworkInfo,
sctx.PU.ContextID,
serviceData,
false,
); err != nil {
return fmt.Errorf("Possible overlap in dependent services: %s", err)
}
}
return nil
} | [
"func",
"(",
"r",
"*",
"Registry",
")",
"updateDependentServices",
"(",
"sctx",
"*",
"ServiceContext",
")",
"error",
"{",
"for",
"_",
",",
"service",
":=",
"range",
"sctx",
".",
"PU",
".",
"Policy",
".",
"DependentServices",
"(",
")",
"{",
"if",
"len",
"(",
"service",
".",
"CACert",
")",
"!=",
"0",
"{",
"sctx",
".",
"RootCA",
"=",
"append",
"(",
"sctx",
".",
"RootCA",
",",
"service",
".",
"CACert",
")",
"\n",
"}",
"\n\n",
"serviceData",
":=",
"&",
"DependentServiceData",
"{",
"ServiceType",
":",
"serviceTypeToApplicationListenerType",
"(",
"service",
".",
"Type",
")",
",",
"}",
"\n",
"if",
"service",
".",
"Type",
"==",
"policy",
".",
"ServiceHTTP",
"{",
"serviceData",
".",
"APICache",
"=",
"urisearch",
".",
"NewAPICache",
"(",
"service",
".",
"HTTPRules",
",",
"service",
".",
"ID",
",",
"service",
".",
"External",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"sctx",
".",
"dependentServiceCache",
".",
"Add",
"(",
"service",
".",
"NetworkInfo",
",",
"sctx",
".",
"PU",
".",
"ContextID",
",",
"serviceData",
",",
"false",
",",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // updateDependentServices will update all the information in the
// ServiceContext for the dependent services. | [
"updateDependentServices",
"will",
"update",
"all",
"the",
"information",
"in",
"the",
"ServiceContext",
"for",
"the",
"dependent",
"services",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/serviceregistry/serviceregistry.go#L267-L294 |
7,006 | aporeto-inc/trireme-lib | controller/internal/enforcer/nfqdatapath/autoport.go | resync | func (d *Datapath) resync(newPortMap map[string]map[string]bool) {
iptablesInstance := iptablesctrl.GetInstance()
if iptablesInstance == nil {
return
}
for k, vs := range d.puToPortsMap {
m := newPortMap[k]
for v := range vs {
if m == nil || !m[v] {
err := iptablesInstance.DeletePortFromPortSet(k, v)
if err != nil {
zap.L().Debug("Delete port set returned error", zap.Error(err))
}
// delete the port from contextIDFromTCPPort cache
err = d.contextIDFromTCPPort.RemoveStringPorts(v)
if err != nil {
zap.L().Debug("can not remove port from cache", zap.Error(err))
}
}
}
}
for k, vs := range newPortMap {
m := d.puToPortsMap[k]
for v := range vs {
if m == nil || !m[v] {
portSpec, err := portspec.NewPortSpecFromString(v, k)
if err != nil {
continue
}
d.contextIDFromTCPPort.AddPortSpec(portSpec)
err = iptablesInstance.AddPortToPortSet(k, v)
if err != nil {
zap.L().Error("Failed to add port to portset", zap.String("context", k), zap.String("port", v))
}
}
}
}
d.puToPortsMap = newPortMap
} | go | func (d *Datapath) resync(newPortMap map[string]map[string]bool) {
iptablesInstance := iptablesctrl.GetInstance()
if iptablesInstance == nil {
return
}
for k, vs := range d.puToPortsMap {
m := newPortMap[k]
for v := range vs {
if m == nil || !m[v] {
err := iptablesInstance.DeletePortFromPortSet(k, v)
if err != nil {
zap.L().Debug("Delete port set returned error", zap.Error(err))
}
// delete the port from contextIDFromTCPPort cache
err = d.contextIDFromTCPPort.RemoveStringPorts(v)
if err != nil {
zap.L().Debug("can not remove port from cache", zap.Error(err))
}
}
}
}
for k, vs := range newPortMap {
m := d.puToPortsMap[k]
for v := range vs {
if m == nil || !m[v] {
portSpec, err := portspec.NewPortSpecFromString(v, k)
if err != nil {
continue
}
d.contextIDFromTCPPort.AddPortSpec(portSpec)
err = iptablesInstance.AddPortToPortSet(k, v)
if err != nil {
zap.L().Error("Failed to add port to portset", zap.String("context", k), zap.String("port", v))
}
}
}
}
d.puToPortsMap = newPortMap
} | [
"func",
"(",
"d",
"*",
"Datapath",
")",
"resync",
"(",
"newPortMap",
"map",
"[",
"string",
"]",
"map",
"[",
"string",
"]",
"bool",
")",
"{",
"iptablesInstance",
":=",
"iptablesctrl",
".",
"GetInstance",
"(",
")",
"\n",
"if",
"iptablesInstance",
"==",
"nil",
"{",
"return",
"\n",
"}",
"\n\n",
"for",
"k",
",",
"vs",
":=",
"range",
"d",
".",
"puToPortsMap",
"{",
"m",
":=",
"newPortMap",
"[",
"k",
"]",
"\n\n",
"for",
"v",
":=",
"range",
"vs",
"{",
"if",
"m",
"==",
"nil",
"||",
"!",
"m",
"[",
"v",
"]",
"{",
"err",
":=",
"iptablesInstance",
".",
"DeletePortFromPortSet",
"(",
"k",
",",
"v",
")",
"\n\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n",
"// delete the port from contextIDFromTCPPort cache",
"err",
"=",
"d",
".",
"contextIDFromTCPPort",
".",
"RemoveStringPorts",
"(",
"v",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n\n",
"for",
"k",
",",
"vs",
":=",
"range",
"newPortMap",
"{",
"m",
":=",
"d",
".",
"puToPortsMap",
"[",
"k",
"]",
"\n",
"for",
"v",
":=",
"range",
"vs",
"{",
"if",
"m",
"==",
"nil",
"||",
"!",
"m",
"[",
"v",
"]",
"{",
"portSpec",
",",
"err",
":=",
"portspec",
".",
"NewPortSpecFromString",
"(",
"v",
",",
"k",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"continue",
"\n",
"}",
"\n",
"d",
".",
"contextIDFromTCPPort",
".",
"AddPortSpec",
"(",
"portSpec",
")",
"\n",
"err",
"=",
"iptablesInstance",
".",
"AddPortToPortSet",
"(",
"k",
",",
"v",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"k",
")",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"v",
")",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n\n",
"d",
".",
"puToPortsMap",
"=",
"newPortMap",
"\n",
"}"
] | // resync adds new port for the PU and removes the stale ports | [
"resync",
"adds",
"new",
"port",
"for",
"the",
"PU",
"and",
"removes",
"the",
"stale",
"ports"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/nfqdatapath/autoport.go#L70-L113 |
7,007 | aporeto-inc/trireme-lib | controller/pkg/usertokens/common/common.go | FlattenClaim | func FlattenClaim(key string, claim interface{}) []string {
attributes := []string{}
if slice, ok := claim.([]string); ok {
for _, data := range slice {
attributes = append(attributes, key+"="+data)
}
}
if attr, ok := claim.(string); ok {
attributes = append(attributes, key+"="+attr)
}
if kv, ok := claim.(map[string]interface{}); ok {
for ikey, ivalue := range kv {
if attr, ok := ivalue.(string); ok {
attributes = append(attributes, key+":"+ikey+"="+attr)
}
}
}
return attributes
} | go | func FlattenClaim(key string, claim interface{}) []string {
attributes := []string{}
if slice, ok := claim.([]string); ok {
for _, data := range slice {
attributes = append(attributes, key+"="+data)
}
}
if attr, ok := claim.(string); ok {
attributes = append(attributes, key+"="+attr)
}
if kv, ok := claim.(map[string]interface{}); ok {
for ikey, ivalue := range kv {
if attr, ok := ivalue.(string); ok {
attributes = append(attributes, key+":"+ikey+"="+attr)
}
}
}
return attributes
} | [
"func",
"FlattenClaim",
"(",
"key",
"string",
",",
"claim",
"interface",
"{",
"}",
")",
"[",
"]",
"string",
"{",
"attributes",
":=",
"[",
"]",
"string",
"{",
"}",
"\n",
"if",
"slice",
",",
"ok",
":=",
"claim",
".",
"(",
"[",
"]",
"string",
")",
";",
"ok",
"{",
"for",
"_",
",",
"data",
":=",
"range",
"slice",
"{",
"attributes",
"=",
"append",
"(",
"attributes",
",",
"key",
"+",
"\"",
"\"",
"+",
"data",
")",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"attr",
",",
"ok",
":=",
"claim",
".",
"(",
"string",
")",
";",
"ok",
"{",
"attributes",
"=",
"append",
"(",
"attributes",
",",
"key",
"+",
"\"",
"\"",
"+",
"attr",
")",
"\n",
"}",
"\n",
"if",
"kv",
",",
"ok",
":=",
"claim",
".",
"(",
"map",
"[",
"string",
"]",
"interface",
"{",
"}",
")",
";",
"ok",
"{",
"for",
"ikey",
",",
"ivalue",
":=",
"range",
"kv",
"{",
"if",
"attr",
",",
"ok",
":=",
"ivalue",
".",
"(",
"string",
")",
";",
"ok",
"{",
"attributes",
"=",
"append",
"(",
"attributes",
",",
"key",
"+",
"\"",
"\"",
"+",
"ikey",
"+",
"\"",
"\"",
"+",
"attr",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"attributes",
"\n",
"}"
] | // FlattenClaim flattes all the generic claims in a flat array for strings. | [
"FlattenClaim",
"flattes",
"all",
"the",
"generic",
"claims",
"in",
"a",
"flat",
"array",
"for",
"strings",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/usertokens/common/common.go#L13-L31 |
7,008 | aporeto-inc/trireme-lib | monitor/internal/docker/monitor.go | SetupConfig | func (d *DockerMonitor) SetupConfig(registerer registerer.Registerer, cfg interface{}) (err error) {
defaultConfig := DefaultConfig()
if cfg == nil {
cfg = defaultConfig
}
dockerConfig, ok := cfg.(*Config)
if !ok {
return fmt.Errorf("Invalid configuration specified")
}
// Setup defaults
dockerConfig = SetupDefaultConfig(dockerConfig)
d.socketType = dockerConfig.SocketType
d.socketAddress = dockerConfig.SocketAddress
d.metadataExtractor = dockerConfig.EventMetadataExtractor
d.syncAtStart = dockerConfig.SyncAtStart
d.killContainerOnPolicyError = dockerConfig.KillContainerOnPolicyError
d.handlers = make(map[Event]func(ctx context.Context, event *events.Message) error)
d.stoplistener = make(chan bool)
d.netcls = cgnetcls.NewDockerCgroupNetController()
d.numberOfQueues = runtime.NumCPU() * 8
d.eventnotifications = make([]chan *events.Message, d.numberOfQueues)
d.stopprocessor = make([]chan bool, d.numberOfQueues)
for i := 0; i < d.numberOfQueues; i++ {
d.eventnotifications[i] = make(chan *events.Message, 1000)
d.stopprocessor[i] = make(chan bool)
}
// Add handlers for the events that we know how to process
d.addHandler(EventCreate, d.handleCreateEvent)
d.addHandler(EventStart, d.handleStartEvent)
d.addHandler(EventDie, d.handleDieEvent)
d.addHandler(EventDestroy, d.handleDestroyEvent)
d.addHandler(EventPause, d.handlePauseEvent)
d.addHandler(EventUnpause, d.handleUnpauseEvent)
return nil
} | go | func (d *DockerMonitor) SetupConfig(registerer registerer.Registerer, cfg interface{}) (err error) {
defaultConfig := DefaultConfig()
if cfg == nil {
cfg = defaultConfig
}
dockerConfig, ok := cfg.(*Config)
if !ok {
return fmt.Errorf("Invalid configuration specified")
}
// Setup defaults
dockerConfig = SetupDefaultConfig(dockerConfig)
d.socketType = dockerConfig.SocketType
d.socketAddress = dockerConfig.SocketAddress
d.metadataExtractor = dockerConfig.EventMetadataExtractor
d.syncAtStart = dockerConfig.SyncAtStart
d.killContainerOnPolicyError = dockerConfig.KillContainerOnPolicyError
d.handlers = make(map[Event]func(ctx context.Context, event *events.Message) error)
d.stoplistener = make(chan bool)
d.netcls = cgnetcls.NewDockerCgroupNetController()
d.numberOfQueues = runtime.NumCPU() * 8
d.eventnotifications = make([]chan *events.Message, d.numberOfQueues)
d.stopprocessor = make([]chan bool, d.numberOfQueues)
for i := 0; i < d.numberOfQueues; i++ {
d.eventnotifications[i] = make(chan *events.Message, 1000)
d.stopprocessor[i] = make(chan bool)
}
// Add handlers for the events that we know how to process
d.addHandler(EventCreate, d.handleCreateEvent)
d.addHandler(EventStart, d.handleStartEvent)
d.addHandler(EventDie, d.handleDieEvent)
d.addHandler(EventDestroy, d.handleDestroyEvent)
d.addHandler(EventPause, d.handlePauseEvent)
d.addHandler(EventUnpause, d.handleUnpauseEvent)
return nil
} | [
"func",
"(",
"d",
"*",
"DockerMonitor",
")",
"SetupConfig",
"(",
"registerer",
"registerer",
".",
"Registerer",
",",
"cfg",
"interface",
"{",
"}",
")",
"(",
"err",
"error",
")",
"{",
"defaultConfig",
":=",
"DefaultConfig",
"(",
")",
"\n\n",
"if",
"cfg",
"==",
"nil",
"{",
"cfg",
"=",
"defaultConfig",
"\n",
"}",
"\n\n",
"dockerConfig",
",",
"ok",
":=",
"cfg",
".",
"(",
"*",
"Config",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// Setup defaults",
"dockerConfig",
"=",
"SetupDefaultConfig",
"(",
"dockerConfig",
")",
"\n\n",
"d",
".",
"socketType",
"=",
"dockerConfig",
".",
"SocketType",
"\n",
"d",
".",
"socketAddress",
"=",
"dockerConfig",
".",
"SocketAddress",
"\n",
"d",
".",
"metadataExtractor",
"=",
"dockerConfig",
".",
"EventMetadataExtractor",
"\n",
"d",
".",
"syncAtStart",
"=",
"dockerConfig",
".",
"SyncAtStart",
"\n",
"d",
".",
"killContainerOnPolicyError",
"=",
"dockerConfig",
".",
"KillContainerOnPolicyError",
"\n",
"d",
".",
"handlers",
"=",
"make",
"(",
"map",
"[",
"Event",
"]",
"func",
"(",
"ctx",
"context",
".",
"Context",
",",
"event",
"*",
"events",
".",
"Message",
")",
"error",
")",
"\n",
"d",
".",
"stoplistener",
"=",
"make",
"(",
"chan",
"bool",
")",
"\n",
"d",
".",
"netcls",
"=",
"cgnetcls",
".",
"NewDockerCgroupNetController",
"(",
")",
"\n",
"d",
".",
"numberOfQueues",
"=",
"runtime",
".",
"NumCPU",
"(",
")",
"*",
"8",
"\n",
"d",
".",
"eventnotifications",
"=",
"make",
"(",
"[",
"]",
"chan",
"*",
"events",
".",
"Message",
",",
"d",
".",
"numberOfQueues",
")",
"\n",
"d",
".",
"stopprocessor",
"=",
"make",
"(",
"[",
"]",
"chan",
"bool",
",",
"d",
".",
"numberOfQueues",
")",
"\n",
"for",
"i",
":=",
"0",
";",
"i",
"<",
"d",
".",
"numberOfQueues",
";",
"i",
"++",
"{",
"d",
".",
"eventnotifications",
"[",
"i",
"]",
"=",
"make",
"(",
"chan",
"*",
"events",
".",
"Message",
",",
"1000",
")",
"\n",
"d",
".",
"stopprocessor",
"[",
"i",
"]",
"=",
"make",
"(",
"chan",
"bool",
")",
"\n",
"}",
"\n\n",
"// Add handlers for the events that we know how to process",
"d",
".",
"addHandler",
"(",
"EventCreate",
",",
"d",
".",
"handleCreateEvent",
")",
"\n",
"d",
".",
"addHandler",
"(",
"EventStart",
",",
"d",
".",
"handleStartEvent",
")",
"\n",
"d",
".",
"addHandler",
"(",
"EventDie",
",",
"d",
".",
"handleDieEvent",
")",
"\n",
"d",
".",
"addHandler",
"(",
"EventDestroy",
",",
"d",
".",
"handleDestroyEvent",
")",
"\n",
"d",
".",
"addHandler",
"(",
"EventPause",
",",
"d",
".",
"handlePauseEvent",
")",
"\n",
"d",
".",
"addHandler",
"(",
"EventUnpause",
",",
"d",
".",
"handleUnpauseEvent",
")",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // SetupConfig provides a configuration to implmentations. Every implementation
// can have its own config type. | [
"SetupConfig",
"provides",
"a",
"configuration",
"to",
"implmentations",
".",
"Every",
"implementation",
"can",
"have",
"its",
"own",
"config",
"type",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/docker/monitor.go#L55-L96 |
7,009 | aporeto-inc/trireme-lib | monitor/internal/docker/monitor.go | Run | func (d *DockerMonitor) Run(ctx context.Context) error {
if err := d.config.IsComplete(); err != nil {
return fmt.Errorf("docker: %s", err)
}
err := d.waitForDockerDaemon(ctx)
if err != nil {
zap.L().Error("Docker daemon is not running - skipping container processing", zap.Error(err))
return nil
}
if d.syncAtStart && d.config.Policy != nil {
options := types.ContainerListOptions{All: true}
containers, err := d.dockerClient.ContainerList(ctx, options)
if err != nil {
return fmt.Errorf("unable to get container list: %s", err)
}
// Starting the eventListener and wait to hear on channel for it to be ready.
// Need to start before the resync process so that we don't loose any events.
// They will be buffered. We don't want to start the listener before
// getting the list from docker though, to avoid duplicates.
listenerReady := make(chan struct{})
go d.eventListener(ctx, listenerReady)
<-listenerReady
zap.L().Debug("Syncing all existing containers")
// Syncing all Existing containers depending on MonitorSetting
if err := d.resyncContainers(ctx, containers); err != nil {
zap.L().Error("Unable to sync existing containers", zap.Error(err))
}
} else {
// Starting the eventListener and wait to hear on channel for it to be ready.
// We are not doing resync. We just start the listener.
listenerReady := make(chan struct{})
go d.eventListener(ctx, listenerReady)
<-listenerReady
}
// Start processing the events
go d.eventProcessors(ctx)
return nil
} | go | func (d *DockerMonitor) Run(ctx context.Context) error {
if err := d.config.IsComplete(); err != nil {
return fmt.Errorf("docker: %s", err)
}
err := d.waitForDockerDaemon(ctx)
if err != nil {
zap.L().Error("Docker daemon is not running - skipping container processing", zap.Error(err))
return nil
}
if d.syncAtStart && d.config.Policy != nil {
options := types.ContainerListOptions{All: true}
containers, err := d.dockerClient.ContainerList(ctx, options)
if err != nil {
return fmt.Errorf("unable to get container list: %s", err)
}
// Starting the eventListener and wait to hear on channel for it to be ready.
// Need to start before the resync process so that we don't loose any events.
// They will be buffered. We don't want to start the listener before
// getting the list from docker though, to avoid duplicates.
listenerReady := make(chan struct{})
go d.eventListener(ctx, listenerReady)
<-listenerReady
zap.L().Debug("Syncing all existing containers")
// Syncing all Existing containers depending on MonitorSetting
if err := d.resyncContainers(ctx, containers); err != nil {
zap.L().Error("Unable to sync existing containers", zap.Error(err))
}
} else {
// Starting the eventListener and wait to hear on channel for it to be ready.
// We are not doing resync. We just start the listener.
listenerReady := make(chan struct{})
go d.eventListener(ctx, listenerReady)
<-listenerReady
}
// Start processing the events
go d.eventProcessors(ctx)
return nil
} | [
"func",
"(",
"d",
"*",
"DockerMonitor",
")",
"Run",
"(",
"ctx",
"context",
".",
"Context",
")",
"error",
"{",
"if",
"err",
":=",
"d",
".",
"config",
".",
"IsComplete",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"err",
":=",
"d",
".",
"waitForDockerDaemon",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"return",
"nil",
"\n",
"}",
"\n\n",
"if",
"d",
".",
"syncAtStart",
"&&",
"d",
".",
"config",
".",
"Policy",
"!=",
"nil",
"{",
"options",
":=",
"types",
".",
"ContainerListOptions",
"{",
"All",
":",
"true",
"}",
"\n",
"containers",
",",
"err",
":=",
"d",
".",
"dockerClient",
".",
"ContainerList",
"(",
"ctx",
",",
"options",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"// Starting the eventListener and wait to hear on channel for it to be ready.",
"// Need to start before the resync process so that we don't loose any events.",
"// They will be buffered. We don't want to start the listener before",
"// getting the list from docker though, to avoid duplicates.",
"listenerReady",
":=",
"make",
"(",
"chan",
"struct",
"{",
"}",
")",
"\n",
"go",
"d",
".",
"eventListener",
"(",
"ctx",
",",
"listenerReady",
")",
"\n",
"<-",
"listenerReady",
"\n\n",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"// Syncing all Existing containers depending on MonitorSetting",
"if",
"err",
":=",
"d",
".",
"resyncContainers",
"(",
"ctx",
",",
"containers",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"// Starting the eventListener and wait to hear on channel for it to be ready.",
"// We are not doing resync. We just start the listener.",
"listenerReady",
":=",
"make",
"(",
"chan",
"struct",
"{",
"}",
")",
"\n",
"go",
"d",
".",
"eventListener",
"(",
"ctx",
",",
"listenerReady",
")",
"\n",
"<-",
"listenerReady",
"\n",
"}",
"\n\n",
"// Start processing the events",
"go",
"d",
".",
"eventProcessors",
"(",
"ctx",
")",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Run will start the DockerPolicy Enforcement.
// It applies a policy to each Container already Up and Running.
// It listens to all ContainerEvents | [
"Run",
"will",
"start",
"the",
"DockerPolicy",
"Enforcement",
".",
"It",
"applies",
"a",
"policy",
"to",
"each",
"Container",
"already",
"Up",
"and",
"Running",
".",
"It",
"listens",
"to",
"all",
"ContainerEvents"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/docker/monitor.go#L109-L154 |
7,010 | aporeto-inc/trireme-lib | monitor/internal/docker/monitor.go | sendRequestToQueue | func (d *DockerMonitor) sendRequestToQueue(r *events.Message) {
key0 := uint64(256203161)
key1 := uint64(982451653)
key := d.getHashKey(r)
h := siphash.Hash(key0, key1, []byte(key))
d.eventnotifications[int(h%uint64(d.numberOfQueues))] <- r
} | go | func (d *DockerMonitor) sendRequestToQueue(r *events.Message) {
key0 := uint64(256203161)
key1 := uint64(982451653)
key := d.getHashKey(r)
h := siphash.Hash(key0, key1, []byte(key))
d.eventnotifications[int(h%uint64(d.numberOfQueues))] <- r
} | [
"func",
"(",
"d",
"*",
"DockerMonitor",
")",
"sendRequestToQueue",
"(",
"r",
"*",
"events",
".",
"Message",
")",
"{",
"key0",
":=",
"uint64",
"(",
"256203161",
")",
"\n",
"key1",
":=",
"uint64",
"(",
"982451653",
")",
"\n\n",
"key",
":=",
"d",
".",
"getHashKey",
"(",
"r",
")",
"\n",
"h",
":=",
"siphash",
".",
"Hash",
"(",
"key0",
",",
"key1",
",",
"[",
"]",
"byte",
"(",
"key",
")",
")",
"\n\n",
"d",
".",
"eventnotifications",
"[",
"int",
"(",
"h",
"%",
"uint64",
"(",
"d",
".",
"numberOfQueues",
")",
")",
"]",
"<-",
"r",
"\n",
"}"
] | // sendRequestToQueue sends a request to a channel based on a hash function | [
"sendRequestToQueue",
"sends",
"a",
"request",
"to",
"a",
"channel",
"based",
"on",
"a",
"hash",
"function"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/docker/monitor.go#L175-L184 |
7,011 | aporeto-inc/trireme-lib | monitor/internal/docker/monitor.go | eventProcessors | func (d *DockerMonitor) eventProcessors(ctx context.Context) {
for i := 0; i < d.numberOfQueues; i++ {
go func(i int) {
for {
select {
case event := <-d.eventnotifications[i]:
if f, ok := d.handlers[Event(event.Action)]; ok {
if err := f(ctx, event); err != nil {
zap.L().Error("Unable to handle docker event",
zap.String("action", event.Action),
zap.Error(err),
)
}
continue
}
case <-ctx.Done():
return
}
}
}(i)
}
} | go | func (d *DockerMonitor) eventProcessors(ctx context.Context) {
for i := 0; i < d.numberOfQueues; i++ {
go func(i int) {
for {
select {
case event := <-d.eventnotifications[i]:
if f, ok := d.handlers[Event(event.Action)]; ok {
if err := f(ctx, event); err != nil {
zap.L().Error("Unable to handle docker event",
zap.String("action", event.Action),
zap.Error(err),
)
}
continue
}
case <-ctx.Done():
return
}
}
}(i)
}
} | [
"func",
"(",
"d",
"*",
"DockerMonitor",
")",
"eventProcessors",
"(",
"ctx",
"context",
".",
"Context",
")",
"{",
"for",
"i",
":=",
"0",
";",
"i",
"<",
"d",
".",
"numberOfQueues",
";",
"i",
"++",
"{",
"go",
"func",
"(",
"i",
"int",
")",
"{",
"for",
"{",
"select",
"{",
"case",
"event",
":=",
"<-",
"d",
".",
"eventnotifications",
"[",
"i",
"]",
":",
"if",
"f",
",",
"ok",
":=",
"d",
".",
"handlers",
"[",
"Event",
"(",
"event",
".",
"Action",
")",
"]",
";",
"ok",
"{",
"if",
"err",
":=",
"f",
"(",
"ctx",
",",
"event",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"event",
".",
"Action",
")",
",",
"zap",
".",
"Error",
"(",
"err",
")",
",",
")",
"\n",
"}",
"\n",
"continue",
"\n",
"}",
"\n",
"case",
"<-",
"ctx",
".",
"Done",
"(",
")",
":",
"return",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"(",
"i",
")",
"\n",
"}",
"\n",
"}"
] | // eventProcessor processes docker events. We are processing multiple
// queues in parallel so that we can activate containers as fast
// as possible. | [
"eventProcessor",
"processes",
"docker",
"events",
".",
"We",
"are",
"processing",
"multiple",
"queues",
"in",
"parallel",
"so",
"that",
"we",
"can",
"activate",
"containers",
"as",
"fast",
"as",
"possible",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/docker/monitor.go#L189-L211 |
7,012 | aporeto-inc/trireme-lib | monitor/internal/docker/monitor.go | eventListener | func (d *DockerMonitor) eventListener(ctx context.Context, listenerReady chan struct{}) {
f := filters.NewArgs()
f.Add("type", "container")
options := types.EventsOptions{
Filters: f,
}
messages, errs := d.dockerClient.Events(context.Background(), options)
// Once the buffered event channel was returned by Docker we return the ready status.
listenerReady <- struct{}{}
for {
select {
case message := <-messages:
zap.L().Debug("Got message from docker client",
zap.String("action", message.Action),
zap.String("ID", message.ID),
)
d.sendRequestToQueue(&message)
case err := <-errs:
if err != nil && err != io.EOF {
zap.L().Warn("Received docker event error",
zap.Error(err),
)
}
case <-ctx.Done():
return
}
}
} | go | func (d *DockerMonitor) eventListener(ctx context.Context, listenerReady chan struct{}) {
f := filters.NewArgs()
f.Add("type", "container")
options := types.EventsOptions{
Filters: f,
}
messages, errs := d.dockerClient.Events(context.Background(), options)
// Once the buffered event channel was returned by Docker we return the ready status.
listenerReady <- struct{}{}
for {
select {
case message := <-messages:
zap.L().Debug("Got message from docker client",
zap.String("action", message.Action),
zap.String("ID", message.ID),
)
d.sendRequestToQueue(&message)
case err := <-errs:
if err != nil && err != io.EOF {
zap.L().Warn("Received docker event error",
zap.Error(err),
)
}
case <-ctx.Done():
return
}
}
} | [
"func",
"(",
"d",
"*",
"DockerMonitor",
")",
"eventListener",
"(",
"ctx",
"context",
".",
"Context",
",",
"listenerReady",
"chan",
"struct",
"{",
"}",
")",
"{",
"f",
":=",
"filters",
".",
"NewArgs",
"(",
")",
"\n",
"f",
".",
"Add",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n",
"options",
":=",
"types",
".",
"EventsOptions",
"{",
"Filters",
":",
"f",
",",
"}",
"\n\n",
"messages",
",",
"errs",
":=",
"d",
".",
"dockerClient",
".",
"Events",
"(",
"context",
".",
"Background",
"(",
")",
",",
"options",
")",
"\n\n",
"// Once the buffered event channel was returned by Docker we return the ready status.",
"listenerReady",
"<-",
"struct",
"{",
"}",
"{",
"}",
"\n\n",
"for",
"{",
"select",
"{",
"case",
"message",
":=",
"<-",
"messages",
":",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"message",
".",
"Action",
")",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"message",
".",
"ID",
")",
",",
")",
"\n",
"d",
".",
"sendRequestToQueue",
"(",
"&",
"message",
")",
"\n\n",
"case",
"err",
":=",
"<-",
"errs",
":",
"if",
"err",
"!=",
"nil",
"&&",
"err",
"!=",
"io",
".",
"EOF",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Warn",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
",",
")",
"\n",
"}",
"\n",
"case",
"<-",
"ctx",
".",
"Done",
"(",
")",
":",
"return",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // eventListener listens to Docker events from the daemon and passes to
// to the processor through a buffered channel. This minimizes the chances
// that we will miss events because the processor is delayed | [
"eventListener",
"listens",
"to",
"Docker",
"events",
"from",
"the",
"daemon",
"and",
"passes",
"to",
"to",
"the",
"processor",
"through",
"a",
"buffered",
"channel",
".",
"This",
"minimizes",
"the",
"chances",
"that",
"we",
"will",
"miss",
"events",
"because",
"the",
"processor",
"is",
"delayed"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/docker/monitor.go#L216-L248 |
7,013 | aporeto-inc/trireme-lib | monitor/internal/docker/monitor.go | Resync | func (d *DockerMonitor) Resync(ctx context.Context) error {
if !d.syncAtStart || d.config.Policy == nil {
zap.L().Debug("No synchronization of containers performed")
return nil
}
zap.L().Debug("Syncing all existing containers")
options := types.ContainerListOptions{All: true}
containers, err := d.dockerClient.ContainerList(ctx, options)
if err != nil {
return fmt.Errorf("unable to get container list: %s", err)
}
return d.resyncContainers(ctx, containers)
} | go | func (d *DockerMonitor) Resync(ctx context.Context) error {
if !d.syncAtStart || d.config.Policy == nil {
zap.L().Debug("No synchronization of containers performed")
return nil
}
zap.L().Debug("Syncing all existing containers")
options := types.ContainerListOptions{All: true}
containers, err := d.dockerClient.ContainerList(ctx, options)
if err != nil {
return fmt.Errorf("unable to get container list: %s", err)
}
return d.resyncContainers(ctx, containers)
} | [
"func",
"(",
"d",
"*",
"DockerMonitor",
")",
"Resync",
"(",
"ctx",
"context",
".",
"Context",
")",
"error",
"{",
"if",
"!",
"d",
".",
"syncAtStart",
"||",
"d",
".",
"config",
".",
"Policy",
"==",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"return",
"nil",
"\n",
"}",
"\n\n",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n\n",
"options",
":=",
"types",
".",
"ContainerListOptions",
"{",
"All",
":",
"true",
"}",
"\n",
"containers",
",",
"err",
":=",
"d",
".",
"dockerClient",
".",
"ContainerList",
"(",
"ctx",
",",
"options",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"d",
".",
"resyncContainers",
"(",
"ctx",
",",
"containers",
")",
"\n",
"}"
] | // Resync resyncs all the existing containers on the Host, using the
// same process as when a container is initially spawn up | [
"Resync",
"resyncs",
"all",
"the",
"existing",
"containers",
"on",
"the",
"Host",
"using",
"the",
"same",
"process",
"as",
"when",
"a",
"container",
"is",
"initially",
"spawn",
"up"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/docker/monitor.go#L252-L268 |
7,014 | aporeto-inc/trireme-lib | monitor/internal/docker/monitor.go | resyncContainersByOrder | func (d *DockerMonitor) resyncContainersByOrder(ctx context.Context, containers []types.Container, syncHost bool) error {
for _, c := range containers {
container, err := d.dockerClient.ContainerInspect(ctx, c.ID)
if err != nil {
continue
}
if (syncHost && container.HostConfig.NetworkMode != constants.DockerHostMode) ||
(!syncHost && container.HostConfig.NetworkMode == constants.DockerHostMode) {
continue
}
puID, _ := puIDFromDockerID(container.ID)
runtime, err := d.extractMetadata(&container)
if err != nil {
continue
}
event := common.EventStop
if container.State.Running {
if !container.State.Paused {
event = common.EventStart
} else {
event = common.EventPause
}
}
// If it is a host container, we need to activate it as a Linux process. We will
// override the options that the metadata extractor provided.
if container.HostConfig.NetworkMode == constants.DockerHostMode {
options := hostModeOptions(&container)
options.PolicyExtensions = runtime.Options().PolicyExtensions
runtime.SetOptions(*options)
runtime.SetPUType(common.LinuxProcessPU)
}
runtime.SetOptions(runtime.Options())
if err := d.config.Policy.HandlePUEvent(ctx, puID, event, runtime); err != nil {
zap.L().Error("Unable to sync existing Container",
zap.String("dockerID", c.ID),
zap.Error(err),
)
}
// if the container has hostnet set to true or is linked
// to container with hostnet set to true, program the cgroup.
if isHostNetworkContainer(runtime) {
if err = d.setupHostMode(puID, runtime, &container); err != nil {
return fmt.Errorf("unable to setup host mode for container %s: %s", puID, err)
}
}
}
return nil
} | go | func (d *DockerMonitor) resyncContainersByOrder(ctx context.Context, containers []types.Container, syncHost bool) error {
for _, c := range containers {
container, err := d.dockerClient.ContainerInspect(ctx, c.ID)
if err != nil {
continue
}
if (syncHost && container.HostConfig.NetworkMode != constants.DockerHostMode) ||
(!syncHost && container.HostConfig.NetworkMode == constants.DockerHostMode) {
continue
}
puID, _ := puIDFromDockerID(container.ID)
runtime, err := d.extractMetadata(&container)
if err != nil {
continue
}
event := common.EventStop
if container.State.Running {
if !container.State.Paused {
event = common.EventStart
} else {
event = common.EventPause
}
}
// If it is a host container, we need to activate it as a Linux process. We will
// override the options that the metadata extractor provided.
if container.HostConfig.NetworkMode == constants.DockerHostMode {
options := hostModeOptions(&container)
options.PolicyExtensions = runtime.Options().PolicyExtensions
runtime.SetOptions(*options)
runtime.SetPUType(common.LinuxProcessPU)
}
runtime.SetOptions(runtime.Options())
if err := d.config.Policy.HandlePUEvent(ctx, puID, event, runtime); err != nil {
zap.L().Error("Unable to sync existing Container",
zap.String("dockerID", c.ID),
zap.Error(err),
)
}
// if the container has hostnet set to true or is linked
// to container with hostnet set to true, program the cgroup.
if isHostNetworkContainer(runtime) {
if err = d.setupHostMode(puID, runtime, &container); err != nil {
return fmt.Errorf("unable to setup host mode for container %s: %s", puID, err)
}
}
}
return nil
} | [
"func",
"(",
"d",
"*",
"DockerMonitor",
")",
"resyncContainersByOrder",
"(",
"ctx",
"context",
".",
"Context",
",",
"containers",
"[",
"]",
"types",
".",
"Container",
",",
"syncHost",
"bool",
")",
"error",
"{",
"for",
"_",
",",
"c",
":=",
"range",
"containers",
"{",
"container",
",",
"err",
":=",
"d",
".",
"dockerClient",
".",
"ContainerInspect",
"(",
"ctx",
",",
"c",
".",
"ID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"continue",
"\n",
"}",
"\n\n",
"if",
"(",
"syncHost",
"&&",
"container",
".",
"HostConfig",
".",
"NetworkMode",
"!=",
"constants",
".",
"DockerHostMode",
")",
"||",
"(",
"!",
"syncHost",
"&&",
"container",
".",
"HostConfig",
".",
"NetworkMode",
"==",
"constants",
".",
"DockerHostMode",
")",
"{",
"continue",
"\n",
"}",
"\n\n",
"puID",
",",
"_",
":=",
"puIDFromDockerID",
"(",
"container",
".",
"ID",
")",
"\n\n",
"runtime",
",",
"err",
":=",
"d",
".",
"extractMetadata",
"(",
"&",
"container",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"continue",
"\n",
"}",
"\n\n",
"event",
":=",
"common",
".",
"EventStop",
"\n",
"if",
"container",
".",
"State",
".",
"Running",
"{",
"if",
"!",
"container",
".",
"State",
".",
"Paused",
"{",
"event",
"=",
"common",
".",
"EventStart",
"\n",
"}",
"else",
"{",
"event",
"=",
"common",
".",
"EventPause",
"\n",
"}",
"\n",
"}",
"\n\n",
"// If it is a host container, we need to activate it as a Linux process. We will",
"// override the options that the metadata extractor provided.",
"if",
"container",
".",
"HostConfig",
".",
"NetworkMode",
"==",
"constants",
".",
"DockerHostMode",
"{",
"options",
":=",
"hostModeOptions",
"(",
"&",
"container",
")",
"\n",
"options",
".",
"PolicyExtensions",
"=",
"runtime",
".",
"Options",
"(",
")",
".",
"PolicyExtensions",
"\n",
"runtime",
".",
"SetOptions",
"(",
"*",
"options",
")",
"\n",
"runtime",
".",
"SetPUType",
"(",
"common",
".",
"LinuxProcessPU",
")",
"\n",
"}",
"\n\n",
"runtime",
".",
"SetOptions",
"(",
"runtime",
".",
"Options",
"(",
")",
")",
"\n\n",
"if",
"err",
":=",
"d",
".",
"config",
".",
"Policy",
".",
"HandlePUEvent",
"(",
"ctx",
",",
"puID",
",",
"event",
",",
"runtime",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"c",
".",
"ID",
")",
",",
"zap",
".",
"Error",
"(",
"err",
")",
",",
")",
"\n",
"}",
"\n\n",
"// if the container has hostnet set to true or is linked",
"// to container with hostnet set to true, program the cgroup.",
"if",
"isHostNetworkContainer",
"(",
"runtime",
")",
"{",
"if",
"err",
"=",
"d",
".",
"setupHostMode",
"(",
"puID",
",",
"runtime",
",",
"&",
"container",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"puID",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | //container.HostConfig.NetworkMode == constants.DockerHostMode | [
"container",
".",
"HostConfig",
".",
"NetworkMode",
"==",
"constants",
".",
"DockerHostMode"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/docker/monitor.go#L286-L343 |
7,015 | aporeto-inc/trireme-lib | monitor/internal/docker/monitor.go | setupHostMode | func (d *DockerMonitor) setupHostMode(puID string, runtimeInfo policy.RuntimeReader, dockerInfo *types.ContainerJSON) (err error) {
pausePUID := puID
if dockerInfo.HostConfig.NetworkMode == constants.DockerHostMode {
if err = d.netcls.Creategroup(puID); err != nil {
return err
}
// Clean the cgroup on exit, if we have failed t activate.
defer func() {
if err != nil {
if derr := d.netcls.DeleteCgroup(puID); derr != nil {
zap.L().Warn("Failed to clean cgroup",
zap.String("puID", puID),
zap.Error(derr),
zap.Error(err),
)
}
}
}()
markval := runtimeInfo.Options().CgroupMark
if markval == "" {
return errors.New("mark value not found")
}
mark, _ := strconv.ParseUint(markval, 10, 32)
if err := d.netcls.AssignMark(puID, mark); err != nil {
return err
}
} else {
// Add the container pid that is linked to hostnet to
// the cgroup of the parent container.
pausePUID = getPausePUID(policyExtensions(runtimeInfo))
}
return d.netcls.AddProcess(pausePUID, dockerInfo.State.Pid)
} | go | func (d *DockerMonitor) setupHostMode(puID string, runtimeInfo policy.RuntimeReader, dockerInfo *types.ContainerJSON) (err error) {
pausePUID := puID
if dockerInfo.HostConfig.NetworkMode == constants.DockerHostMode {
if err = d.netcls.Creategroup(puID); err != nil {
return err
}
// Clean the cgroup on exit, if we have failed t activate.
defer func() {
if err != nil {
if derr := d.netcls.DeleteCgroup(puID); derr != nil {
zap.L().Warn("Failed to clean cgroup",
zap.String("puID", puID),
zap.Error(derr),
zap.Error(err),
)
}
}
}()
markval := runtimeInfo.Options().CgroupMark
if markval == "" {
return errors.New("mark value not found")
}
mark, _ := strconv.ParseUint(markval, 10, 32)
if err := d.netcls.AssignMark(puID, mark); err != nil {
return err
}
} else {
// Add the container pid that is linked to hostnet to
// the cgroup of the parent container.
pausePUID = getPausePUID(policyExtensions(runtimeInfo))
}
return d.netcls.AddProcess(pausePUID, dockerInfo.State.Pid)
} | [
"func",
"(",
"d",
"*",
"DockerMonitor",
")",
"setupHostMode",
"(",
"puID",
"string",
",",
"runtimeInfo",
"policy",
".",
"RuntimeReader",
",",
"dockerInfo",
"*",
"types",
".",
"ContainerJSON",
")",
"(",
"err",
"error",
")",
"{",
"pausePUID",
":=",
"puID",
"\n",
"if",
"dockerInfo",
".",
"HostConfig",
".",
"NetworkMode",
"==",
"constants",
".",
"DockerHostMode",
"{",
"if",
"err",
"=",
"d",
".",
"netcls",
".",
"Creategroup",
"(",
"puID",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"// Clean the cgroup on exit, if we have failed t activate.",
"defer",
"func",
"(",
")",
"{",
"if",
"err",
"!=",
"nil",
"{",
"if",
"derr",
":=",
"d",
".",
"netcls",
".",
"DeleteCgroup",
"(",
"puID",
")",
";",
"derr",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Warn",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"puID",
")",
",",
"zap",
".",
"Error",
"(",
"derr",
")",
",",
"zap",
".",
"Error",
"(",
"err",
")",
",",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n\n",
"markval",
":=",
"runtimeInfo",
".",
"Options",
"(",
")",
".",
"CgroupMark",
"\n",
"if",
"markval",
"==",
"\"",
"\"",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"mark",
",",
"_",
":=",
"strconv",
".",
"ParseUint",
"(",
"markval",
",",
"10",
",",
"32",
")",
"\n",
"if",
"err",
":=",
"d",
".",
"netcls",
".",
"AssignMark",
"(",
"puID",
",",
"mark",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"else",
"{",
"// Add the container pid that is linked to hostnet to",
"// the cgroup of the parent container.",
"pausePUID",
"=",
"getPausePUID",
"(",
"policyExtensions",
"(",
"runtimeInfo",
")",
")",
"\n",
"}",
"\n\n",
"return",
"d",
".",
"netcls",
".",
"AddProcess",
"(",
"pausePUID",
",",
"dockerInfo",
".",
"State",
".",
"Pid",
")",
"\n",
"}"
] | // setupHostMode sets up the net_cls cgroup for the host mode | [
"setupHostMode",
"sets",
"up",
"the",
"net_cls",
"cgroup",
"for",
"the",
"host",
"mode"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/docker/monitor.go#L346-L384 |
7,016 | aporeto-inc/trireme-lib | monitor/internal/docker/monitor.go | extractMetadata | func (d *DockerMonitor) extractMetadata(dockerInfo *types.ContainerJSON) (*policy.PURuntime, error) {
if dockerInfo == nil {
return nil, errors.New("docker info is empty")
}
if d.metadataExtractor != nil {
return d.metadataExtractor(dockerInfo)
}
return extractors.DefaultMetadataExtractor(dockerInfo)
} | go | func (d *DockerMonitor) extractMetadata(dockerInfo *types.ContainerJSON) (*policy.PURuntime, error) {
if dockerInfo == nil {
return nil, errors.New("docker info is empty")
}
if d.metadataExtractor != nil {
return d.metadataExtractor(dockerInfo)
}
return extractors.DefaultMetadataExtractor(dockerInfo)
} | [
"func",
"(",
"d",
"*",
"DockerMonitor",
")",
"extractMetadata",
"(",
"dockerInfo",
"*",
"types",
".",
"ContainerJSON",
")",
"(",
"*",
"policy",
".",
"PURuntime",
",",
"error",
")",
"{",
"if",
"dockerInfo",
"==",
"nil",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"if",
"d",
".",
"metadataExtractor",
"!=",
"nil",
"{",
"return",
"d",
".",
"metadataExtractor",
"(",
"dockerInfo",
")",
"\n",
"}",
"\n\n",
"return",
"extractors",
".",
"DefaultMetadataExtractor",
"(",
"dockerInfo",
")",
"\n",
"}"
] | // ExtractMetadata generates the RuntimeInfo based on Docker primitive | [
"ExtractMetadata",
"generates",
"the",
"RuntimeInfo",
"based",
"on",
"Docker",
"primitive"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/docker/monitor.go#L413-L424 |
7,017 | aporeto-inc/trireme-lib | monitor/internal/docker/monitor.go | handleCreateEvent | func (d *DockerMonitor) handleCreateEvent(ctx context.Context, event *events.Message) error {
puID, err := puIDFromDockerID(event.ID)
if err != nil {
return err
}
container, err := d.retrieveDockerInfo(ctx, event)
if err != nil {
return err
}
runtime, err := d.extractMetadata(container)
if err != nil {
return err
}
// If it is a host container, we need to activate it as a Linux process. We will
// override the options that the metadata extractor provided. We will maintain
// any policy extensions in the object.
if container.HostConfig.NetworkMode == constants.DockerHostMode {
options := hostModeOptions(container)
options.PolicyExtensions = runtime.Options().PolicyExtensions
runtime.SetOptions(*options)
runtime.SetPUType(common.LinuxProcessPU)
}
runtime.SetOptions(runtime.Options())
return d.config.Policy.HandlePUEvent(ctx, puID, tevents.EventCreate, runtime)
} | go | func (d *DockerMonitor) handleCreateEvent(ctx context.Context, event *events.Message) error {
puID, err := puIDFromDockerID(event.ID)
if err != nil {
return err
}
container, err := d.retrieveDockerInfo(ctx, event)
if err != nil {
return err
}
runtime, err := d.extractMetadata(container)
if err != nil {
return err
}
// If it is a host container, we need to activate it as a Linux process. We will
// override the options that the metadata extractor provided. We will maintain
// any policy extensions in the object.
if container.HostConfig.NetworkMode == constants.DockerHostMode {
options := hostModeOptions(container)
options.PolicyExtensions = runtime.Options().PolicyExtensions
runtime.SetOptions(*options)
runtime.SetPUType(common.LinuxProcessPU)
}
runtime.SetOptions(runtime.Options())
return d.config.Policy.HandlePUEvent(ctx, puID, tevents.EventCreate, runtime)
} | [
"func",
"(",
"d",
"*",
"DockerMonitor",
")",
"handleCreateEvent",
"(",
"ctx",
"context",
".",
"Context",
",",
"event",
"*",
"events",
".",
"Message",
")",
"error",
"{",
"puID",
",",
"err",
":=",
"puIDFromDockerID",
"(",
"event",
".",
"ID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"container",
",",
"err",
":=",
"d",
".",
"retrieveDockerInfo",
"(",
"ctx",
",",
"event",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"runtime",
",",
"err",
":=",
"d",
".",
"extractMetadata",
"(",
"container",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"// If it is a host container, we need to activate it as a Linux process. We will",
"// override the options that the metadata extractor provided. We will maintain",
"// any policy extensions in the object.",
"if",
"container",
".",
"HostConfig",
".",
"NetworkMode",
"==",
"constants",
".",
"DockerHostMode",
"{",
"options",
":=",
"hostModeOptions",
"(",
"container",
")",
"\n",
"options",
".",
"PolicyExtensions",
"=",
"runtime",
".",
"Options",
"(",
")",
".",
"PolicyExtensions",
"\n",
"runtime",
".",
"SetOptions",
"(",
"*",
"options",
")",
"\n",
"runtime",
".",
"SetPUType",
"(",
"common",
".",
"LinuxProcessPU",
")",
"\n",
"}",
"\n\n",
"runtime",
".",
"SetOptions",
"(",
"runtime",
".",
"Options",
"(",
")",
")",
"\n\n",
"return",
"d",
".",
"config",
".",
"Policy",
".",
"HandlePUEvent",
"(",
"ctx",
",",
"puID",
",",
"tevents",
".",
"EventCreate",
",",
"runtime",
")",
"\n",
"}"
] | // handleCreateEvent generates a create event type. We extract the metadata
// and start the policy resolution at the create event. No need to wait
// for the start event. | [
"handleCreateEvent",
"generates",
"a",
"create",
"event",
"type",
".",
"We",
"extract",
"the",
"metadata",
"and",
"start",
"the",
"policy",
"resolution",
"at",
"the",
"create",
"event",
".",
"No",
"need",
"to",
"wait",
"for",
"the",
"start",
"event",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/docker/monitor.go#L429-L459 |
7,018 | aporeto-inc/trireme-lib | monitor/internal/docker/monitor.go | handleStartEvent | func (d *DockerMonitor) handleStartEvent(ctx context.Context, event *events.Message) error {
container, err := d.retrieveDockerInfo(ctx, event)
if err != nil {
return err
}
if !container.State.Running {
return nil
}
puID, err := puIDFromDockerID(container.ID)
if err != nil {
return err
}
runtime, err := d.extractMetadata(container)
if err != nil {
return err
}
// If it is a host container, we need to activate it as a Linux process. We will
// override the options that the metadata extractor provided.
if container.HostConfig.NetworkMode == constants.DockerHostMode {
options := hostModeOptions(container)
options.PolicyExtensions = runtime.Options().PolicyExtensions
runtime.SetOptions(*options)
runtime.SetPUType(common.LinuxProcessPU)
}
runtime.SetOptions(runtime.Options())
if err = d.config.Policy.HandlePUEvent(ctx, puID, tevents.EventStart, runtime); err != nil {
if d.killContainerOnPolicyError {
timeout := 0 * time.Second
if err1 := d.dockerClient.ContainerStop(ctx, event.ID, &timeout); err1 != nil {
zap.L().Warn("Unable to stop illegal container",
zap.String("dockerID", event.ID),
zap.Error(err1),
)
}
d.config.Collector.CollectContainerEvent(&collector.ContainerRecord{
ContextID: event.ID,
IPAddress: nil,
Tags: nil,
Event: collector.ContainerFailed,
})
return fmt.Errorf("unable to start container because of policy: container %s killed: %s", event.ID, err)
}
return fmt.Errorf("unable to set policy: container %s kept alive per policy: %s", puID, err)
}
// if the container has hostnet set to true or is linked
// to container with hostnet set to true, program the cgroup.
if isHostNetworkContainer(runtime) {
if err = d.setupHostMode(puID, runtime, container); err != nil {
return fmt.Errorf("unable to setup host mode for container %s: %s", puID, err)
}
}
return nil
} | go | func (d *DockerMonitor) handleStartEvent(ctx context.Context, event *events.Message) error {
container, err := d.retrieveDockerInfo(ctx, event)
if err != nil {
return err
}
if !container.State.Running {
return nil
}
puID, err := puIDFromDockerID(container.ID)
if err != nil {
return err
}
runtime, err := d.extractMetadata(container)
if err != nil {
return err
}
// If it is a host container, we need to activate it as a Linux process. We will
// override the options that the metadata extractor provided.
if container.HostConfig.NetworkMode == constants.DockerHostMode {
options := hostModeOptions(container)
options.PolicyExtensions = runtime.Options().PolicyExtensions
runtime.SetOptions(*options)
runtime.SetPUType(common.LinuxProcessPU)
}
runtime.SetOptions(runtime.Options())
if err = d.config.Policy.HandlePUEvent(ctx, puID, tevents.EventStart, runtime); err != nil {
if d.killContainerOnPolicyError {
timeout := 0 * time.Second
if err1 := d.dockerClient.ContainerStop(ctx, event.ID, &timeout); err1 != nil {
zap.L().Warn("Unable to stop illegal container",
zap.String("dockerID", event.ID),
zap.Error(err1),
)
}
d.config.Collector.CollectContainerEvent(&collector.ContainerRecord{
ContextID: event.ID,
IPAddress: nil,
Tags: nil,
Event: collector.ContainerFailed,
})
return fmt.Errorf("unable to start container because of policy: container %s killed: %s", event.ID, err)
}
return fmt.Errorf("unable to set policy: container %s kept alive per policy: %s", puID, err)
}
// if the container has hostnet set to true or is linked
// to container with hostnet set to true, program the cgroup.
if isHostNetworkContainer(runtime) {
if err = d.setupHostMode(puID, runtime, container); err != nil {
return fmt.Errorf("unable to setup host mode for container %s: %s", puID, err)
}
}
return nil
} | [
"func",
"(",
"d",
"*",
"DockerMonitor",
")",
"handleStartEvent",
"(",
"ctx",
"context",
".",
"Context",
",",
"event",
"*",
"events",
".",
"Message",
")",
"error",
"{",
"container",
",",
"err",
":=",
"d",
".",
"retrieveDockerInfo",
"(",
"ctx",
",",
"event",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"if",
"!",
"container",
".",
"State",
".",
"Running",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"puID",
",",
"err",
":=",
"puIDFromDockerID",
"(",
"container",
".",
"ID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"runtime",
",",
"err",
":=",
"d",
".",
"extractMetadata",
"(",
"container",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"// If it is a host container, we need to activate it as a Linux process. We will",
"// override the options that the metadata extractor provided.",
"if",
"container",
".",
"HostConfig",
".",
"NetworkMode",
"==",
"constants",
".",
"DockerHostMode",
"{",
"options",
":=",
"hostModeOptions",
"(",
"container",
")",
"\n",
"options",
".",
"PolicyExtensions",
"=",
"runtime",
".",
"Options",
"(",
")",
".",
"PolicyExtensions",
"\n",
"runtime",
".",
"SetOptions",
"(",
"*",
"options",
")",
"\n",
"runtime",
".",
"SetPUType",
"(",
"common",
".",
"LinuxProcessPU",
")",
"\n",
"}",
"\n\n",
"runtime",
".",
"SetOptions",
"(",
"runtime",
".",
"Options",
"(",
")",
")",
"\n\n",
"if",
"err",
"=",
"d",
".",
"config",
".",
"Policy",
".",
"HandlePUEvent",
"(",
"ctx",
",",
"puID",
",",
"tevents",
".",
"EventStart",
",",
"runtime",
")",
";",
"err",
"!=",
"nil",
"{",
"if",
"d",
".",
"killContainerOnPolicyError",
"{",
"timeout",
":=",
"0",
"*",
"time",
".",
"Second",
"\n",
"if",
"err1",
":=",
"d",
".",
"dockerClient",
".",
"ContainerStop",
"(",
"ctx",
",",
"event",
".",
"ID",
",",
"&",
"timeout",
")",
";",
"err1",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Warn",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"event",
".",
"ID",
")",
",",
"zap",
".",
"Error",
"(",
"err1",
")",
",",
")",
"\n",
"}",
"\n",
"d",
".",
"config",
".",
"Collector",
".",
"CollectContainerEvent",
"(",
"&",
"collector",
".",
"ContainerRecord",
"{",
"ContextID",
":",
"event",
".",
"ID",
",",
"IPAddress",
":",
"nil",
",",
"Tags",
":",
"nil",
",",
"Event",
":",
"collector",
".",
"ContainerFailed",
",",
"}",
")",
"\n",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"event",
".",
"ID",
",",
"err",
")",
"\n",
"}",
"\n",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"puID",
",",
"err",
")",
"\n",
"}",
"\n\n",
"// if the container has hostnet set to true or is linked",
"// to container with hostnet set to true, program the cgroup.",
"if",
"isHostNetworkContainer",
"(",
"runtime",
")",
"{",
"if",
"err",
"=",
"d",
".",
"setupHostMode",
"(",
"puID",
",",
"runtime",
",",
"container",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"puID",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // handleStartEvent will notify the policy engine immediately about the event in order
// to start the implementation of the functions. At this point we know the process ID
// that is needed for the remote enforcers. | [
"handleStartEvent",
"will",
"notify",
"the",
"policy",
"engine",
"immediately",
"about",
"the",
"event",
"in",
"order",
"to",
"start",
"the",
"implementation",
"of",
"the",
"functions",
".",
"At",
"this",
"point",
"we",
"know",
"the",
"process",
"ID",
"that",
"is",
"needed",
"for",
"the",
"remote",
"enforcers",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/docker/monitor.go#L464-L524 |
7,019 | aporeto-inc/trireme-lib | monitor/internal/docker/monitor.go | handleDestroyEvent | func (d *DockerMonitor) handleDestroyEvent(ctx context.Context, event *events.Message) error {
puID, err := puIDFromDockerID(event.ID)
if err != nil {
return err
}
runtime := policy.NewPURuntimeWithDefaults()
runtime.SetOptions(runtime.Options())
err = d.config.Policy.HandlePUEvent(ctx, puID, tevents.EventDestroy, runtime)
if err != nil {
zap.L().Error("Failed to handle delete event",
zap.Error(err),
)
}
if err := d.netcls.DeleteCgroup(puID); err != nil {
zap.L().Warn("Failed to clean netcls group",
zap.String("puID", puID),
zap.Error(err),
)
}
return nil
} | go | func (d *DockerMonitor) handleDestroyEvent(ctx context.Context, event *events.Message) error {
puID, err := puIDFromDockerID(event.ID)
if err != nil {
return err
}
runtime := policy.NewPURuntimeWithDefaults()
runtime.SetOptions(runtime.Options())
err = d.config.Policy.HandlePUEvent(ctx, puID, tevents.EventDestroy, runtime)
if err != nil {
zap.L().Error("Failed to handle delete event",
zap.Error(err),
)
}
if err := d.netcls.DeleteCgroup(puID); err != nil {
zap.L().Warn("Failed to clean netcls group",
zap.String("puID", puID),
zap.Error(err),
)
}
return nil
} | [
"func",
"(",
"d",
"*",
"DockerMonitor",
")",
"handleDestroyEvent",
"(",
"ctx",
"context",
".",
"Context",
",",
"event",
"*",
"events",
".",
"Message",
")",
"error",
"{",
"puID",
",",
"err",
":=",
"puIDFromDockerID",
"(",
"event",
".",
"ID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"runtime",
":=",
"policy",
".",
"NewPURuntimeWithDefaults",
"(",
")",
"\n",
"runtime",
".",
"SetOptions",
"(",
"runtime",
".",
"Options",
"(",
")",
")",
"\n\n",
"err",
"=",
"d",
".",
"config",
".",
"Policy",
".",
"HandlePUEvent",
"(",
"ctx",
",",
"puID",
",",
"tevents",
".",
"EventDestroy",
",",
"runtime",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
",",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"d",
".",
"netcls",
".",
"DeleteCgroup",
"(",
"puID",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Warn",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"puID",
")",
",",
"zap",
".",
"Error",
"(",
"err",
")",
",",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // handleDestroyEvent handles destroy events from Docker. It generated a "Destroy event" | [
"handleDestroyEvent",
"handles",
"destroy",
"events",
"from",
"Docker",
".",
"It",
"generated",
"a",
"Destroy",
"event"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/docker/monitor.go#L541-L565 |
7,020 | aporeto-inc/trireme-lib | monitor/internal/docker/monitor.go | handlePauseEvent | func (d *DockerMonitor) handlePauseEvent(ctx context.Context, event *events.Message) error {
zap.L().Info("UnPause Event for nativeID", zap.String("ID", event.ID))
puID, err := puIDFromDockerID(event.ID)
if err != nil {
return err
}
runtime := policy.NewPURuntimeWithDefaults()
runtime.SetOptions(runtime.Options())
return d.config.Policy.HandlePUEvent(ctx, puID, tevents.EventPause, runtime)
} | go | func (d *DockerMonitor) handlePauseEvent(ctx context.Context, event *events.Message) error {
zap.L().Info("UnPause Event for nativeID", zap.String("ID", event.ID))
puID, err := puIDFromDockerID(event.ID)
if err != nil {
return err
}
runtime := policy.NewPURuntimeWithDefaults()
runtime.SetOptions(runtime.Options())
return d.config.Policy.HandlePUEvent(ctx, puID, tevents.EventPause, runtime)
} | [
"func",
"(",
"d",
"*",
"DockerMonitor",
")",
"handlePauseEvent",
"(",
"ctx",
"context",
".",
"Context",
",",
"event",
"*",
"events",
".",
"Message",
")",
"error",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Info",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"event",
".",
"ID",
")",
")",
"\n\n",
"puID",
",",
"err",
":=",
"puIDFromDockerID",
"(",
"event",
".",
"ID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"runtime",
":=",
"policy",
".",
"NewPURuntimeWithDefaults",
"(",
")",
"\n",
"runtime",
".",
"SetOptions",
"(",
"runtime",
".",
"Options",
"(",
")",
")",
"\n\n",
"return",
"d",
".",
"config",
".",
"Policy",
".",
"HandlePUEvent",
"(",
"ctx",
",",
"puID",
",",
"tevents",
".",
"EventPause",
",",
"runtime",
")",
"\n",
"}"
] | // handlePauseEvent generates a create event type. | [
"handlePauseEvent",
"generates",
"a",
"create",
"event",
"type",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/docker/monitor.go#L568-L580 |
7,021 | aporeto-inc/trireme-lib | monitor/internal/docker/monitor.go | handleUnpauseEvent | func (d *DockerMonitor) handleUnpauseEvent(ctx context.Context, event *events.Message) error {
puID, err := puIDFromDockerID(event.ID)
if err != nil {
return err
}
runtime := policy.NewPURuntimeWithDefaults()
runtime.SetOptions(runtime.Options())
return d.config.Policy.HandlePUEvent(ctx, puID, tevents.EventUnpause, runtime)
} | go | func (d *DockerMonitor) handleUnpauseEvent(ctx context.Context, event *events.Message) error {
puID, err := puIDFromDockerID(event.ID)
if err != nil {
return err
}
runtime := policy.NewPURuntimeWithDefaults()
runtime.SetOptions(runtime.Options())
return d.config.Policy.HandlePUEvent(ctx, puID, tevents.EventUnpause, runtime)
} | [
"func",
"(",
"d",
"*",
"DockerMonitor",
")",
"handleUnpauseEvent",
"(",
"ctx",
"context",
".",
"Context",
",",
"event",
"*",
"events",
".",
"Message",
")",
"error",
"{",
"puID",
",",
"err",
":=",
"puIDFromDockerID",
"(",
"event",
".",
"ID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"runtime",
":=",
"policy",
".",
"NewPURuntimeWithDefaults",
"(",
")",
"\n",
"runtime",
".",
"SetOptions",
"(",
"runtime",
".",
"Options",
"(",
")",
")",
"\n\n",
"return",
"d",
".",
"config",
".",
"Policy",
".",
"HandlePUEvent",
"(",
"ctx",
",",
"puID",
",",
"tevents",
".",
"EventUnpause",
",",
"runtime",
")",
"\n",
"}"
] | // handleCreateEvent generates a create event type. | [
"handleCreateEvent",
"generates",
"a",
"create",
"event",
"type",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/docker/monitor.go#L583-L594 |
7,022 | aporeto-inc/trireme-lib | monitor/internal/docker/monitor.go | waitForDockerDaemon | func (d *DockerMonitor) waitForDockerDaemon(ctx context.Context) (err error) {
done := make(chan bool)
go func() {
for errg := d.setupDockerDaemon(); errg != nil; {
zap.L().Debug("Unable to init docker client. Retrying...", zap.Error(errg))
<-time.After(dockerRetryTimer)
continue
}
done <- true
}()
select {
case <-ctx.Done():
return nil
case <-time.After(dockerInitializationWait):
return fmt.Errorf("Unable to connect to docker daemon")
case <-done:
}
return nil
} | go | func (d *DockerMonitor) waitForDockerDaemon(ctx context.Context) (err error) {
done := make(chan bool)
go func() {
for errg := d.setupDockerDaemon(); errg != nil; {
zap.L().Debug("Unable to init docker client. Retrying...", zap.Error(errg))
<-time.After(dockerRetryTimer)
continue
}
done <- true
}()
select {
case <-ctx.Done():
return nil
case <-time.After(dockerInitializationWait):
return fmt.Errorf("Unable to connect to docker daemon")
case <-done:
}
return nil
} | [
"func",
"(",
"d",
"*",
"DockerMonitor",
")",
"waitForDockerDaemon",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"err",
"error",
")",
"{",
"done",
":=",
"make",
"(",
"chan",
"bool",
")",
"\n",
"go",
"func",
"(",
")",
"{",
"for",
"errg",
":=",
"d",
".",
"setupDockerDaemon",
"(",
")",
";",
"errg",
"!=",
"nil",
";",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"errg",
")",
")",
"\n",
"<-",
"time",
".",
"After",
"(",
"dockerRetryTimer",
")",
"\n",
"continue",
"\n",
"}",
"\n",
"done",
"<-",
"true",
"\n",
"}",
"(",
")",
"\n\n",
"select",
"{",
"case",
"<-",
"ctx",
".",
"Done",
"(",
")",
":",
"return",
"nil",
"\n",
"case",
"<-",
"time",
".",
"After",
"(",
"dockerInitializationWait",
")",
":",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"case",
"<-",
"done",
":",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // waitForDockerDaemon is a blocking call which will try to bring up docker, if not return err
// with timeout | [
"waitForDockerDaemon",
"is",
"a",
"blocking",
"call",
"which",
"will",
"try",
"to",
"bring",
"up",
"docker",
"if",
"not",
"return",
"err",
"with",
"timeout"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/docker/monitor.go#L654-L675 |
7,023 | aporeto-inc/trireme-lib | controller/pkg/secrets/secrets.go | NewSecrets | func NewSecrets(s PublicSecrets) (Secrets, error) {
switch s.SecretsType() {
case PKICompactType:
t := s.(*CompactPKIPublicSecrets)
return NewCompactPKIWithTokenCA(t.Key, t.Certificate, t.CA, t.TokenCAs, t.Token, t.Compressed)
default:
return nil, fmt.Errorf("Unsupported type")
}
} | go | func NewSecrets(s PublicSecrets) (Secrets, error) {
switch s.SecretsType() {
case PKICompactType:
t := s.(*CompactPKIPublicSecrets)
return NewCompactPKIWithTokenCA(t.Key, t.Certificate, t.CA, t.TokenCAs, t.Token, t.Compressed)
default:
return nil, fmt.Errorf("Unsupported type")
}
} | [
"func",
"NewSecrets",
"(",
"s",
"PublicSecrets",
")",
"(",
"Secrets",
",",
"error",
")",
"{",
"switch",
"s",
".",
"SecretsType",
"(",
")",
"{",
"case",
"PKICompactType",
":",
"t",
":=",
"s",
".",
"(",
"*",
"CompactPKIPublicSecrets",
")",
"\n",
"return",
"NewCompactPKIWithTokenCA",
"(",
"t",
".",
"Key",
",",
"t",
".",
"Certificate",
",",
"t",
".",
"CA",
",",
"t",
".",
"TokenCAs",
",",
"t",
".",
"Token",
",",
"t",
".",
"Compressed",
")",
"\n",
"default",
":",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}"
] | // NewSecrets creates a new set of secrets based on the type. | [
"NewSecrets",
"creates",
"a",
"new",
"set",
"of",
"secrets",
"based",
"on",
"the",
"type",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/secrets/secrets.go#L42-L50 |
7,024 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/servicecache/servicecache.go | NewTable | func NewTable() *ServiceCache {
return &ServiceCache{
local: map[int]map[uint32]entryList{},
remote: map[int]map[uint32]entryList{},
remoteHosts: map[string]entryList{},
localHosts: map[string]entryList{},
}
} | go | func NewTable() *ServiceCache {
return &ServiceCache{
local: map[int]map[uint32]entryList{},
remote: map[int]map[uint32]entryList{},
remoteHosts: map[string]entryList{},
localHosts: map[string]entryList{},
}
} | [
"func",
"NewTable",
"(",
")",
"*",
"ServiceCache",
"{",
"return",
"&",
"ServiceCache",
"{",
"local",
":",
"map",
"[",
"int",
"]",
"map",
"[",
"uint32",
"]",
"entryList",
"{",
"}",
",",
"remote",
":",
"map",
"[",
"int",
"]",
"map",
"[",
"uint32",
"]",
"entryList",
"{",
"}",
",",
"remoteHosts",
":",
"map",
"[",
"string",
"]",
"entryList",
"{",
"}",
",",
"localHosts",
":",
"map",
"[",
"string",
"]",
"entryList",
"{",
"}",
",",
"}",
"\n",
"}"
] | // NewTable creates a new table | [
"NewTable",
"creates",
"a",
"new",
"table"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/servicecache/servicecache.go#L43-L50 |
7,025 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/servicecache/servicecache.go | Add | func (s *ServiceCache) Add(e *common.Service, id string, data interface{}, local bool) error {
s.Lock()
defer s.Unlock()
record := &entry{
ports: e.Ports,
data: data,
id: id,
}
if err := s.addPorts(e, record, local); err != nil {
return err
}
if err := s.addHostService(e, record, local); err != nil {
return err
}
return s.addIPService(e, record, local)
} | go | func (s *ServiceCache) Add(e *common.Service, id string, data interface{}, local bool) error {
s.Lock()
defer s.Unlock()
record := &entry{
ports: e.Ports,
data: data,
id: id,
}
if err := s.addPorts(e, record, local); err != nil {
return err
}
if err := s.addHostService(e, record, local); err != nil {
return err
}
return s.addIPService(e, record, local)
} | [
"func",
"(",
"s",
"*",
"ServiceCache",
")",
"Add",
"(",
"e",
"*",
"common",
".",
"Service",
",",
"id",
"string",
",",
"data",
"interface",
"{",
"}",
",",
"local",
"bool",
")",
"error",
"{",
"s",
".",
"Lock",
"(",
")",
"\n",
"defer",
"s",
".",
"Unlock",
"(",
")",
"\n\n",
"record",
":=",
"&",
"entry",
"{",
"ports",
":",
"e",
".",
"Ports",
",",
"data",
":",
"data",
",",
"id",
":",
"id",
",",
"}",
"\n",
"if",
"err",
":=",
"s",
".",
"addPorts",
"(",
"e",
",",
"record",
",",
"local",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"s",
".",
"addHostService",
"(",
"e",
",",
"record",
",",
"local",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"return",
"s",
".",
"addIPService",
"(",
"e",
",",
"record",
",",
"local",
")",
"\n",
"}"
] | // Add adds a service into the cache. Returns error of if any overlap has been detected. | [
"Add",
"adds",
"a",
"service",
"into",
"the",
"cache",
".",
"Returns",
"error",
"of",
"if",
"any",
"overlap",
"has",
"been",
"detected",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/servicecache/servicecache.go#L53-L71 |
7,026 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/servicecache/servicecache.go | Find | func (s *ServiceCache) Find(ip net.IP, port int, host string, local bool) interface{} {
s.RLock()
defer s.RUnlock()
if host != "" {
if data := s.findHost(host, port, local); data != nil {
return data
}
}
return s.findIP(ip, port, local)
} | go | func (s *ServiceCache) Find(ip net.IP, port int, host string, local bool) interface{} {
s.RLock()
defer s.RUnlock()
if host != "" {
if data := s.findHost(host, port, local); data != nil {
return data
}
}
return s.findIP(ip, port, local)
} | [
"func",
"(",
"s",
"*",
"ServiceCache",
")",
"Find",
"(",
"ip",
"net",
".",
"IP",
",",
"port",
"int",
",",
"host",
"string",
",",
"local",
"bool",
")",
"interface",
"{",
"}",
"{",
"s",
".",
"RLock",
"(",
")",
"\n",
"defer",
"s",
".",
"RUnlock",
"(",
")",
"\n\n",
"if",
"host",
"!=",
"\"",
"\"",
"{",
"if",
"data",
":=",
"s",
".",
"findHost",
"(",
"host",
",",
"port",
",",
"local",
")",
";",
"data",
"!=",
"nil",
"{",
"return",
"data",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"s",
".",
"findIP",
"(",
"ip",
",",
"port",
",",
"local",
")",
"\n",
"}"
] | // Find searches for a matching service, given an IP and port. Caller must specify
// the local or remote context. | [
"Find",
"searches",
"for",
"a",
"matching",
"service",
"given",
"an",
"IP",
"and",
"port",
".",
"Caller",
"must",
"specify",
"the",
"local",
"or",
"remote",
"context",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/servicecache/servicecache.go#L75-L86 |
7,027 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/servicecache/servicecache.go | FindListeningServicesForPU | func (s *ServiceCache) FindListeningServicesForPU(id string) (interface{}, *portspec.PortSpec) {
s.RLock()
defer s.RUnlock()
for _, spec := range s.localPorts {
if spec.id == id {
return spec.data, spec.ports
}
}
return nil, nil
} | go | func (s *ServiceCache) FindListeningServicesForPU(id string) (interface{}, *portspec.PortSpec) {
s.RLock()
defer s.RUnlock()
for _, spec := range s.localPorts {
if spec.id == id {
return spec.data, spec.ports
}
}
return nil, nil
} | [
"func",
"(",
"s",
"*",
"ServiceCache",
")",
"FindListeningServicesForPU",
"(",
"id",
"string",
")",
"(",
"interface",
"{",
"}",
",",
"*",
"portspec",
".",
"PortSpec",
")",
"{",
"s",
".",
"RLock",
"(",
")",
"\n",
"defer",
"s",
".",
"RUnlock",
"(",
")",
"\n\n",
"for",
"_",
",",
"spec",
":=",
"range",
"s",
".",
"localPorts",
"{",
"if",
"spec",
".",
"id",
"==",
"id",
"{",
"return",
"spec",
".",
"data",
",",
"spec",
".",
"ports",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
",",
"nil",
"\n",
"}"
] | // FindListeningServicesForPU returns a service that is found and the associated
// portSpecifications that refer to this service. | [
"FindListeningServicesForPU",
"returns",
"a",
"service",
"that",
"is",
"found",
"and",
"the",
"associated",
"portSpecifications",
"that",
"refer",
"to",
"this",
"service",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/servicecache/servicecache.go#L90-L100 |
7,028 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/servicecache/servicecache.go | DeleteByID | func (s *ServiceCache) DeleteByID(id string, local bool) {
s.Lock()
defer s.Unlock()
hosts := s.remoteHosts
prefixes := s.remote
if local {
hosts = s.localHosts
prefixes = s.local
}
if local {
s.localPorts = deleteMatchingPorts(s.localPorts, id)
} else {
s.remotePorts = deleteMatchingPorts(s.remotePorts, id)
}
for host, ports := range hosts {
hosts[host] = deleteMatchingPorts(ports, id)
if len(hosts[host]) == 0 {
delete(hosts, host)
}
}
for l, prefix := range prefixes {
for ip, ports := range prefix {
prefix[ip] = deleteMatchingPorts(ports, id)
if len(prefix[ip]) == 0 {
delete(prefix, ip)
}
}
if len(prefix) == 0 {
delete(prefixes, l)
}
}
} | go | func (s *ServiceCache) DeleteByID(id string, local bool) {
s.Lock()
defer s.Unlock()
hosts := s.remoteHosts
prefixes := s.remote
if local {
hosts = s.localHosts
prefixes = s.local
}
if local {
s.localPorts = deleteMatchingPorts(s.localPorts, id)
} else {
s.remotePorts = deleteMatchingPorts(s.remotePorts, id)
}
for host, ports := range hosts {
hosts[host] = deleteMatchingPorts(ports, id)
if len(hosts[host]) == 0 {
delete(hosts, host)
}
}
for l, prefix := range prefixes {
for ip, ports := range prefix {
prefix[ip] = deleteMatchingPorts(ports, id)
if len(prefix[ip]) == 0 {
delete(prefix, ip)
}
}
if len(prefix) == 0 {
delete(prefixes, l)
}
}
} | [
"func",
"(",
"s",
"*",
"ServiceCache",
")",
"DeleteByID",
"(",
"id",
"string",
",",
"local",
"bool",
")",
"{",
"s",
".",
"Lock",
"(",
")",
"\n",
"defer",
"s",
".",
"Unlock",
"(",
")",
"\n\n",
"hosts",
":=",
"s",
".",
"remoteHosts",
"\n",
"prefixes",
":=",
"s",
".",
"remote",
"\n",
"if",
"local",
"{",
"hosts",
"=",
"s",
".",
"localHosts",
"\n",
"prefixes",
"=",
"s",
".",
"local",
"\n",
"}",
"\n\n",
"if",
"local",
"{",
"s",
".",
"localPorts",
"=",
"deleteMatchingPorts",
"(",
"s",
".",
"localPorts",
",",
"id",
")",
"\n",
"}",
"else",
"{",
"s",
".",
"remotePorts",
"=",
"deleteMatchingPorts",
"(",
"s",
".",
"remotePorts",
",",
"id",
")",
"\n",
"}",
"\n\n",
"for",
"host",
",",
"ports",
":=",
"range",
"hosts",
"{",
"hosts",
"[",
"host",
"]",
"=",
"deleteMatchingPorts",
"(",
"ports",
",",
"id",
")",
"\n",
"if",
"len",
"(",
"hosts",
"[",
"host",
"]",
")",
"==",
"0",
"{",
"delete",
"(",
"hosts",
",",
"host",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"for",
"l",
",",
"prefix",
":=",
"range",
"prefixes",
"{",
"for",
"ip",
",",
"ports",
":=",
"range",
"prefix",
"{",
"prefix",
"[",
"ip",
"]",
"=",
"deleteMatchingPorts",
"(",
"ports",
",",
"id",
")",
"\n",
"if",
"len",
"(",
"prefix",
"[",
"ip",
"]",
")",
"==",
"0",
"{",
"delete",
"(",
"prefix",
",",
"ip",
")",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"len",
"(",
"prefix",
")",
"==",
"0",
"{",
"delete",
"(",
"prefixes",
",",
"l",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // DeleteByID will delete all entries related to this ID from all references. | [
"DeleteByID",
"will",
"delete",
"all",
"entries",
"related",
"to",
"this",
"ID",
"from",
"all",
"references",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/servicecache/servicecache.go#L103-L138 |
7,029 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/servicecache/servicecache.go | addPorts | func (s *ServiceCache) addPorts(e *common.Service, record *entry, local bool) error {
if !local {
return nil
}
for _, spec := range s.localPorts {
if spec.ports.Overlaps(e.Ports) {
return fmt.Errorf("service port overlap in the global port list: %+v %s", e.Addresses, e.Ports.String())
}
}
s.localPorts = append(s.localPorts, record)
return nil
} | go | func (s *ServiceCache) addPorts(e *common.Service, record *entry, local bool) error {
if !local {
return nil
}
for _, spec := range s.localPorts {
if spec.ports.Overlaps(e.Ports) {
return fmt.Errorf("service port overlap in the global port list: %+v %s", e.Addresses, e.Ports.String())
}
}
s.localPorts = append(s.localPorts, record)
return nil
} | [
"func",
"(",
"s",
"*",
"ServiceCache",
")",
"addPorts",
"(",
"e",
"*",
"common",
".",
"Service",
",",
"record",
"*",
"entry",
",",
"local",
"bool",
")",
"error",
"{",
"if",
"!",
"local",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"spec",
":=",
"range",
"s",
".",
"localPorts",
"{",
"if",
"spec",
".",
"ports",
".",
"Overlaps",
"(",
"e",
".",
"Ports",
")",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"e",
".",
"Addresses",
",",
"e",
".",
"Ports",
".",
"String",
"(",
")",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"s",
".",
"localPorts",
"=",
"append",
"(",
"s",
".",
"localPorts",
",",
"record",
")",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // addPorts will only work for local ports. | [
"addPorts",
"will",
"only",
"work",
"for",
"local",
"ports",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/servicecache/servicecache.go#L257-L271 |
7,030 | aporeto-inc/trireme-lib | controller/internal/supervisor/proxy/supervisorproxy.go | Supervise | func (s *ProxyInfo) Supervise(contextID string, puInfo *policy.PUInfo) error {
return nil
} | go | func (s *ProxyInfo) Supervise(contextID string, puInfo *policy.PUInfo) error {
return nil
} | [
"func",
"(",
"s",
"*",
"ProxyInfo",
")",
"Supervise",
"(",
"contextID",
"string",
",",
"puInfo",
"*",
"policy",
".",
"PUInfo",
")",
"error",
"{",
"return",
"nil",
"\n",
"}"
] | // Supervise just keeps track of the active remotes so that it can initiate updates. | [
"Supervise",
"just",
"keeps",
"track",
"of",
"the",
"active",
"remotes",
"so",
"that",
"it",
"can",
"initiate",
"updates",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/supervisor/proxy/supervisorproxy.go#L17-L20 |
7,031 | aporeto-inc/trireme-lib | monitor/mockmonitor/mockmonitor.go | NewMockMonitor | func NewMockMonitor(ctrl *gomock.Controller) *MockMonitor {
mock := &MockMonitor{ctrl: ctrl}
mock.recorder = &MockMonitorMockRecorder{mock}
return mock
} | go | func NewMockMonitor(ctrl *gomock.Controller) *MockMonitor {
mock := &MockMonitor{ctrl: ctrl}
mock.recorder = &MockMonitorMockRecorder{mock}
return mock
} | [
"func",
"NewMockMonitor",
"(",
"ctrl",
"*",
"gomock",
".",
"Controller",
")",
"*",
"MockMonitor",
"{",
"mock",
":=",
"&",
"MockMonitor",
"{",
"ctrl",
":",
"ctrl",
"}",
"\n",
"mock",
".",
"recorder",
"=",
"&",
"MockMonitorMockRecorder",
"{",
"mock",
"}",
"\n",
"return",
"mock",
"\n",
"}"
] | // NewMockMonitor creates a new mock instance
// nolint | [
"NewMockMonitor",
"creates",
"a",
"new",
"mock",
"instance",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/mockmonitor/mockmonitor.go#L31-L35 |
7,032 | aporeto-inc/trireme-lib | monitor/mockmonitor/mockmonitor.go | NewMockImplementation | func NewMockImplementation(ctrl *gomock.Controller) *MockImplementation {
mock := &MockImplementation{ctrl: ctrl}
mock.recorder = &MockImplementationMockRecorder{mock}
return mock
} | go | func NewMockImplementation(ctrl *gomock.Controller) *MockImplementation {
mock := &MockImplementation{ctrl: ctrl}
mock.recorder = &MockImplementationMockRecorder{mock}
return mock
} | [
"func",
"NewMockImplementation",
"(",
"ctrl",
"*",
"gomock",
".",
"Controller",
")",
"*",
"MockImplementation",
"{",
"mock",
":=",
"&",
"MockImplementation",
"{",
"ctrl",
":",
"ctrl",
"}",
"\n",
"mock",
".",
"recorder",
"=",
"&",
"MockImplementationMockRecorder",
"{",
"mock",
"}",
"\n",
"return",
"mock",
"\n",
"}"
] | // NewMockImplementation creates a new mock instance
// nolint | [
"NewMockImplementation",
"creates",
"a",
"new",
"mock",
"instance",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/mockmonitor/mockmonitor.go#L100-L104 |
7,033 | aporeto-inc/trireme-lib | monitor/mockmonitor/mockmonitor.go | SetupConfig | func (m *MockImplementation) SetupConfig(registerer registerer.Registerer, cfg interface{}) error {
ret := m.ctrl.Call(m, "SetupConfig", registerer, cfg)
ret0, _ := ret[0].(error)
return ret0
} | go | func (m *MockImplementation) SetupConfig(registerer registerer.Registerer, cfg interface{}) error {
ret := m.ctrl.Call(m, "SetupConfig", registerer, cfg)
ret0, _ := ret[0].(error)
return ret0
} | [
"func",
"(",
"m",
"*",
"MockImplementation",
")",
"SetupConfig",
"(",
"registerer",
"registerer",
".",
"Registerer",
",",
"cfg",
"interface",
"{",
"}",
")",
"error",
"{",
"ret",
":=",
"m",
".",
"ctrl",
".",
"Call",
"(",
"m",
",",
"\"",
"\"",
",",
"registerer",
",",
"cfg",
")",
"\n",
"ret0",
",",
"_",
":=",
"ret",
"[",
"0",
"]",
".",
"(",
"error",
")",
"\n",
"return",
"ret0",
"\n",
"}"
] | // SetupConfig mocks base method
// nolint | [
"SetupConfig",
"mocks",
"base",
"method",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/mockmonitor/mockmonitor.go#L128-L132 |
7,034 | aporeto-inc/trireme-lib | monitor/mockmonitor/mockmonitor.go | SetupConfig | func (mr *MockImplementationMockRecorder) SetupConfig(registerer, cfg interface{}) *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetupConfig", reflect.TypeOf((*MockImplementation)(nil).SetupConfig), registerer, cfg)
} | go | func (mr *MockImplementationMockRecorder) SetupConfig(registerer, cfg interface{}) *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetupConfig", reflect.TypeOf((*MockImplementation)(nil).SetupConfig), registerer, cfg)
} | [
"func",
"(",
"mr",
"*",
"MockImplementationMockRecorder",
")",
"SetupConfig",
"(",
"registerer",
",",
"cfg",
"interface",
"{",
"}",
")",
"*",
"gomock",
".",
"Call",
"{",
"return",
"mr",
".",
"mock",
".",
"ctrl",
".",
"RecordCallWithMethodType",
"(",
"mr",
".",
"mock",
",",
"\"",
"\"",
",",
"reflect",
".",
"TypeOf",
"(",
"(",
"*",
"MockImplementation",
")",
"(",
"nil",
")",
".",
"SetupConfig",
")",
",",
"registerer",
",",
"cfg",
")",
"\n",
"}"
] | // SetupConfig indicates an expected call of SetupConfig
// nolint | [
"SetupConfig",
"indicates",
"an",
"expected",
"call",
"of",
"SetupConfig",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/mockmonitor/mockmonitor.go#L136-L138 |
7,035 | aporeto-inc/trireme-lib | monitor/mockmonitor/mockmonitor.go | SetupHandlers | func (m *MockImplementation) SetupHandlers(c *config.ProcessorConfig) {
m.ctrl.Call(m, "SetupHandlers", c)
} | go | func (m *MockImplementation) SetupHandlers(c *config.ProcessorConfig) {
m.ctrl.Call(m, "SetupHandlers", c)
} | [
"func",
"(",
"m",
"*",
"MockImplementation",
")",
"SetupHandlers",
"(",
"c",
"*",
"config",
".",
"ProcessorConfig",
")",
"{",
"m",
".",
"ctrl",
".",
"Call",
"(",
"m",
",",
"\"",
"\"",
",",
"c",
")",
"\n",
"}"
] | // SetupHandlers mocks base method
// nolint | [
"SetupHandlers",
"mocks",
"base",
"method",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/mockmonitor/mockmonitor.go#L142-L144 |
7,036 | aporeto-inc/trireme-lib | monitor/mockmonitor/mockmonitor.go | SetupHandlers | func (mr *MockImplementationMockRecorder) SetupHandlers(c interface{}) *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetupHandlers", reflect.TypeOf((*MockImplementation)(nil).SetupHandlers), c)
} | go | func (mr *MockImplementationMockRecorder) SetupHandlers(c interface{}) *gomock.Call {
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetupHandlers", reflect.TypeOf((*MockImplementation)(nil).SetupHandlers), c)
} | [
"func",
"(",
"mr",
"*",
"MockImplementationMockRecorder",
")",
"SetupHandlers",
"(",
"c",
"interface",
"{",
"}",
")",
"*",
"gomock",
".",
"Call",
"{",
"return",
"mr",
".",
"mock",
".",
"ctrl",
".",
"RecordCallWithMethodType",
"(",
"mr",
".",
"mock",
",",
"\"",
"\"",
",",
"reflect",
".",
"TypeOf",
"(",
"(",
"*",
"MockImplementation",
")",
"(",
"nil",
")",
".",
"SetupHandlers",
")",
",",
"c",
")",
"\n",
"}"
] | // SetupHandlers indicates an expected call of SetupHandlers
// nolint | [
"SetupHandlers",
"indicates",
"an",
"expected",
"call",
"of",
"SetupHandlers",
"nolint"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/mockmonitor/mockmonitor.go#L148-L150 |
7,037 | aporeto-inc/trireme-lib | controller/pkg/aclprovider/ipsetprovider.go | NewIpset | func (i *goIpsetProvider) NewIpset(name string, hasht string, p *ipset.Params) (Ipset, error) {
return ipset.New(name, hasht, p)
} | go | func (i *goIpsetProvider) NewIpset(name string, hasht string, p *ipset.Params) (Ipset, error) {
return ipset.New(name, hasht, p)
} | [
"func",
"(",
"i",
"*",
"goIpsetProvider",
")",
"NewIpset",
"(",
"name",
"string",
",",
"hasht",
"string",
",",
"p",
"*",
"ipset",
".",
"Params",
")",
"(",
"Ipset",
",",
"error",
")",
"{",
"return",
"ipset",
".",
"New",
"(",
"name",
",",
"hasht",
",",
"p",
")",
"\n",
"}"
] | // NewIpset returns an IpsetProvider interface based on the go-ipset
// external package. | [
"NewIpset",
"returns",
"an",
"IpsetProvider",
"interface",
"based",
"on",
"the",
"go",
"-",
"ipset",
"external",
"package",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/aclprovider/ipsetprovider.go#L34-L36 |
7,038 | aporeto-inc/trireme-lib | controller/pkg/aclprovider/ipsetprovider.go | GetIpset | func (i *goIpsetProvider) GetIpset(name string) Ipset {
return &ipset.IPSet{
Name: name,
}
} | go | func (i *goIpsetProvider) GetIpset(name string) Ipset {
return &ipset.IPSet{
Name: name,
}
} | [
"func",
"(",
"i",
"*",
"goIpsetProvider",
")",
"GetIpset",
"(",
"name",
"string",
")",
"Ipset",
"{",
"return",
"&",
"ipset",
".",
"IPSet",
"{",
"Name",
":",
"name",
",",
"}",
"\n",
"}"
] | // GetIpset gets the ipset object from the name. | [
"GetIpset",
"gets",
"the",
"ipset",
"object",
"from",
"the",
"name",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/aclprovider/ipsetprovider.go#L39-L43 |
7,039 | aporeto-inc/trireme-lib | controller/pkg/aclprovider/ipsetprovider.go | DestroyAll | func (i *goIpsetProvider) DestroyAll(prefix string) error {
sets, err := i.ListIPSets()
if err != nil {
return ipset.DestroyAll()
}
for _, s := range sets {
if !strings.HasPrefix(s, prefix) {
continue
}
ips := i.GetIpset(s)
if err := ips.Destroy(); err != nil {
return ipset.DestroyAll()
}
}
return nil
} | go | func (i *goIpsetProvider) DestroyAll(prefix string) error {
sets, err := i.ListIPSets()
if err != nil {
return ipset.DestroyAll()
}
for _, s := range sets {
if !strings.HasPrefix(s, prefix) {
continue
}
ips := i.GetIpset(s)
if err := ips.Destroy(); err != nil {
return ipset.DestroyAll()
}
}
return nil
} | [
"func",
"(",
"i",
"*",
"goIpsetProvider",
")",
"DestroyAll",
"(",
"prefix",
"string",
")",
"error",
"{",
"sets",
",",
"err",
":=",
"i",
".",
"ListIPSets",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"ipset",
".",
"DestroyAll",
"(",
")",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"s",
":=",
"range",
"sets",
"{",
"if",
"!",
"strings",
".",
"HasPrefix",
"(",
"s",
",",
"prefix",
")",
"{",
"continue",
"\n",
"}",
"\n",
"ips",
":=",
"i",
".",
"GetIpset",
"(",
"s",
")",
"\n",
"if",
"err",
":=",
"ips",
".",
"Destroy",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"ipset",
".",
"DestroyAll",
"(",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // DestroyAll destroys all the ipsets - it will fail if there are existing references | [
"DestroyAll",
"destroys",
"all",
"the",
"ipsets",
"-",
"it",
"will",
"fail",
"if",
"there",
"are",
"existing",
"references"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/aclprovider/ipsetprovider.go#L46-L64 |
7,040 | aporeto-inc/trireme-lib | monitor/monitor.go | UpdateConfiguration | func (m *monitors) UpdateConfiguration(ctx context.Context, config *config.MonitorConfig) error {
// Monitor configuration cannot change at this time.
// TODO:
return nil
} | go | func (m *monitors) UpdateConfiguration(ctx context.Context, config *config.MonitorConfig) error {
// Monitor configuration cannot change at this time.
// TODO:
return nil
} | [
"func",
"(",
"m",
"*",
"monitors",
")",
"UpdateConfiguration",
"(",
"ctx",
"context",
".",
"Context",
",",
"config",
"*",
"config",
".",
"MonitorConfig",
")",
"error",
"{",
"// Monitor configuration cannot change at this time.",
"// TODO:",
"return",
"nil",
"\n",
"}"
] | // UpdateConfiguration updates the configuration of the monitors. | [
"UpdateConfiguration",
"updates",
"the",
"configuration",
"of",
"the",
"monitors",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/monitor.go#L150-L154 |
7,041 | aporeto-inc/trireme-lib | monitor/monitor.go | Resync | func (m *monitors) Resync(ctx context.Context) error {
failure := false
var errs string
for _, i := range m.monitors {
if err := i.Resync(ctx); err != nil {
errs = errs + err.Error()
failure = true
}
}
if failure {
return fmt.Errorf("Monitor resync failed: %s", errs)
}
return nil
} | go | func (m *monitors) Resync(ctx context.Context) error {
failure := false
var errs string
for _, i := range m.monitors {
if err := i.Resync(ctx); err != nil {
errs = errs + err.Error()
failure = true
}
}
if failure {
return fmt.Errorf("Monitor resync failed: %s", errs)
}
return nil
} | [
"func",
"(",
"m",
"*",
"monitors",
")",
"Resync",
"(",
"ctx",
"context",
".",
"Context",
")",
"error",
"{",
"failure",
":=",
"false",
"\n",
"var",
"errs",
"string",
"\n\n",
"for",
"_",
",",
"i",
":=",
"range",
"m",
".",
"monitors",
"{",
"if",
"err",
":=",
"i",
".",
"Resync",
"(",
"ctx",
")",
";",
"err",
"!=",
"nil",
"{",
"errs",
"=",
"errs",
"+",
"err",
".",
"Error",
"(",
")",
"\n",
"failure",
"=",
"true",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"failure",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"errs",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Resync resyncs the monitor | [
"Resync",
"resyncs",
"the",
"monitor"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/monitor.go#L157-L174 |
7,042 | aporeto-inc/trireme-lib | controller/internal/enforcer/nfqdatapath/datapath.go | Enforce | func (d *Datapath) Enforce(contextID string, puInfo *policy.PUInfo) error {
// Always create a new PU context
pu, err := pucontext.NewPU(contextID, puInfo, d.ExternalIPCacheTimeout)
if err != nil {
return fmt.Errorf("error creating new pu: %s", err)
}
// Cache PUs for retrieval based on packet information
if pu.Type() != common.ContainerPU {
mark, tcpPorts, udpPorts := pu.GetProcessKeys()
d.puFromMark.AddOrUpdate(mark, pu)
if pu.Type() == common.UIDLoginPU {
user := puInfo.Runtime.Options().UserID
d.puFromUser.AddOrUpdate(user, pu)
}
for _, port := range tcpPorts {
if port == "0" {
continue
}
portSpec, err := portspec.NewPortSpecFromString(port, contextID)
if err != nil {
continue
}
if puInfo.Runtime.PUType() == common.HostPU {
d.contextIDFromTCPPort.AddPortSpecToEnd(portSpec)
} else {
d.contextIDFromTCPPort.AddPortSpec(portSpec)
}
}
for _, port := range udpPorts {
portSpec, err := portspec.NewPortSpecFromString(port, contextID)
if err != nil {
continue
}
// check for host pu and add its ports to the end.
if puInfo.Runtime.PUType() == common.HostPU {
d.contextIDFromUDPPort.AddPortSpecToEnd(portSpec)
} else {
d.contextIDFromUDPPort.AddPortSpec(portSpec)
}
}
} else {
d.puFromIP = pu
}
// pucontext launches a go routine to periodically
// lookup dns names. ctx cancel signals the go routine to exit
if prevPU, _ := d.puFromContextID.Get(contextID); prevPU != nil {
prevPU.(*pucontext.PUContext).CancelFunc()
}
// Cache PU from contextID for management and policy updates
d.puFromContextID.AddOrUpdate(contextID, pu)
return nil
} | go | func (d *Datapath) Enforce(contextID string, puInfo *policy.PUInfo) error {
// Always create a new PU context
pu, err := pucontext.NewPU(contextID, puInfo, d.ExternalIPCacheTimeout)
if err != nil {
return fmt.Errorf("error creating new pu: %s", err)
}
// Cache PUs for retrieval based on packet information
if pu.Type() != common.ContainerPU {
mark, tcpPorts, udpPorts := pu.GetProcessKeys()
d.puFromMark.AddOrUpdate(mark, pu)
if pu.Type() == common.UIDLoginPU {
user := puInfo.Runtime.Options().UserID
d.puFromUser.AddOrUpdate(user, pu)
}
for _, port := range tcpPorts {
if port == "0" {
continue
}
portSpec, err := portspec.NewPortSpecFromString(port, contextID)
if err != nil {
continue
}
if puInfo.Runtime.PUType() == common.HostPU {
d.contextIDFromTCPPort.AddPortSpecToEnd(portSpec)
} else {
d.contextIDFromTCPPort.AddPortSpec(portSpec)
}
}
for _, port := range udpPorts {
portSpec, err := portspec.NewPortSpecFromString(port, contextID)
if err != nil {
continue
}
// check for host pu and add its ports to the end.
if puInfo.Runtime.PUType() == common.HostPU {
d.contextIDFromUDPPort.AddPortSpecToEnd(portSpec)
} else {
d.contextIDFromUDPPort.AddPortSpec(portSpec)
}
}
} else {
d.puFromIP = pu
}
// pucontext launches a go routine to periodically
// lookup dns names. ctx cancel signals the go routine to exit
if prevPU, _ := d.puFromContextID.Get(contextID); prevPU != nil {
prevPU.(*pucontext.PUContext).CancelFunc()
}
// Cache PU from contextID for management and policy updates
d.puFromContextID.AddOrUpdate(contextID, pu)
return nil
} | [
"func",
"(",
"d",
"*",
"Datapath",
")",
"Enforce",
"(",
"contextID",
"string",
",",
"puInfo",
"*",
"policy",
".",
"PUInfo",
")",
"error",
"{",
"// Always create a new PU context",
"pu",
",",
"err",
":=",
"pucontext",
".",
"NewPU",
"(",
"contextID",
",",
"puInfo",
",",
"d",
".",
"ExternalIPCacheTimeout",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"// Cache PUs for retrieval based on packet information",
"if",
"pu",
".",
"Type",
"(",
")",
"!=",
"common",
".",
"ContainerPU",
"{",
"mark",
",",
"tcpPorts",
",",
"udpPorts",
":=",
"pu",
".",
"GetProcessKeys",
"(",
")",
"\n",
"d",
".",
"puFromMark",
".",
"AddOrUpdate",
"(",
"mark",
",",
"pu",
")",
"\n\n",
"if",
"pu",
".",
"Type",
"(",
")",
"==",
"common",
".",
"UIDLoginPU",
"{",
"user",
":=",
"puInfo",
".",
"Runtime",
".",
"Options",
"(",
")",
".",
"UserID",
"\n",
"d",
".",
"puFromUser",
".",
"AddOrUpdate",
"(",
"user",
",",
"pu",
")",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"port",
":=",
"range",
"tcpPorts",
"{",
"if",
"port",
"==",
"\"",
"\"",
"{",
"continue",
"\n",
"}",
"\n\n",
"portSpec",
",",
"err",
":=",
"portspec",
".",
"NewPortSpecFromString",
"(",
"port",
",",
"contextID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"continue",
"\n",
"}",
"\n\n",
"if",
"puInfo",
".",
"Runtime",
".",
"PUType",
"(",
")",
"==",
"common",
".",
"HostPU",
"{",
"d",
".",
"contextIDFromTCPPort",
".",
"AddPortSpecToEnd",
"(",
"portSpec",
")",
"\n",
"}",
"else",
"{",
"d",
".",
"contextIDFromTCPPort",
".",
"AddPortSpec",
"(",
"portSpec",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"port",
":=",
"range",
"udpPorts",
"{",
"portSpec",
",",
"err",
":=",
"portspec",
".",
"NewPortSpecFromString",
"(",
"port",
",",
"contextID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"continue",
"\n",
"}",
"\n\n",
"// check for host pu and add its ports to the end.",
"if",
"puInfo",
".",
"Runtime",
".",
"PUType",
"(",
")",
"==",
"common",
".",
"HostPU",
"{",
"d",
".",
"contextIDFromUDPPort",
".",
"AddPortSpecToEnd",
"(",
"portSpec",
")",
"\n",
"}",
"else",
"{",
"d",
".",
"contextIDFromUDPPort",
".",
"AddPortSpec",
"(",
"portSpec",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"}",
"else",
"{",
"d",
".",
"puFromIP",
"=",
"pu",
"\n",
"}",
"\n\n",
"// pucontext launches a go routine to periodically",
"// lookup dns names. ctx cancel signals the go routine to exit",
"if",
"prevPU",
",",
"_",
":=",
"d",
".",
"puFromContextID",
".",
"Get",
"(",
"contextID",
")",
";",
"prevPU",
"!=",
"nil",
"{",
"prevPU",
".",
"(",
"*",
"pucontext",
".",
"PUContext",
")",
".",
"CancelFunc",
"(",
")",
"\n",
"}",
"\n\n",
"// Cache PU from contextID for management and policy updates",
"d",
".",
"puFromContextID",
".",
"AddOrUpdate",
"(",
"contextID",
",",
"pu",
")",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Enforce implements the Enforce interface method and configures the data path for a new PU | [
"Enforce",
"implements",
"the",
"Enforce",
"interface",
"method",
"and",
"configures",
"the",
"data",
"path",
"for",
"a",
"new",
"PU"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/nfqdatapath/datapath.go#L322-L386 |
7,043 | aporeto-inc/trireme-lib | controller/internal/enforcer/nfqdatapath/datapath.go | Unenforce | func (d *Datapath) Unenforce(contextID string) error {
var err error
puContext, err := d.puFromContextID.Get(contextID)
if err != nil {
return fmt.Errorf("contextid not found in enforcer: %s", err)
}
// Cleanup the IP based lookup
pu := puContext.(*pucontext.PUContext)
// Cleanup the mark information
if err = d.puFromMark.Remove(pu.Mark()); err != nil {
zap.L().Debug("Unable to remove cache entry during unenforcement",
zap.String("Mark", pu.Mark()),
zap.Error(err),
)
}
// Cleanup the username
if pu.Type() == common.UIDLoginPU {
if err = d.puFromUser.Remove(pu.Username()); err != nil {
zap.L().Debug("PU not found for the username", zap.String("username", pu.Username()))
}
}
// Cleanup the port cache
for _, port := range pu.TCPPorts() {
if port == "0" {
continue
}
if err := d.contextIDFromTCPPort.RemoveStringPorts(port); err != nil {
zap.L().Debug("Unable to remove cache entry during unenforcement",
zap.String("TCPPort", port),
zap.Error(err),
)
}
}
for _, port := range pu.UDPPorts() {
if err := d.contextIDFromUDPPort.RemoveStringPorts(port); err != nil {
zap.L().Debug("Unable to remove cache entry during unenforcement",
zap.String("UDPPort", port),
zap.Error(err),
)
}
}
// Cleanup the contextID cache
if err := d.puFromContextID.RemoveWithDelay(contextID, 10*time.Second); err != nil {
zap.L().Warn("Unable to remove context from cache",
zap.String("contextID", contextID),
zap.Error(err),
)
}
return nil
} | go | func (d *Datapath) Unenforce(contextID string) error {
var err error
puContext, err := d.puFromContextID.Get(contextID)
if err != nil {
return fmt.Errorf("contextid not found in enforcer: %s", err)
}
// Cleanup the IP based lookup
pu := puContext.(*pucontext.PUContext)
// Cleanup the mark information
if err = d.puFromMark.Remove(pu.Mark()); err != nil {
zap.L().Debug("Unable to remove cache entry during unenforcement",
zap.String("Mark", pu.Mark()),
zap.Error(err),
)
}
// Cleanup the username
if pu.Type() == common.UIDLoginPU {
if err = d.puFromUser.Remove(pu.Username()); err != nil {
zap.L().Debug("PU not found for the username", zap.String("username", pu.Username()))
}
}
// Cleanup the port cache
for _, port := range pu.TCPPorts() {
if port == "0" {
continue
}
if err := d.contextIDFromTCPPort.RemoveStringPorts(port); err != nil {
zap.L().Debug("Unable to remove cache entry during unenforcement",
zap.String("TCPPort", port),
zap.Error(err),
)
}
}
for _, port := range pu.UDPPorts() {
if err := d.contextIDFromUDPPort.RemoveStringPorts(port); err != nil {
zap.L().Debug("Unable to remove cache entry during unenforcement",
zap.String("UDPPort", port),
zap.Error(err),
)
}
}
// Cleanup the contextID cache
if err := d.puFromContextID.RemoveWithDelay(contextID, 10*time.Second); err != nil {
zap.L().Warn("Unable to remove context from cache",
zap.String("contextID", contextID),
zap.Error(err),
)
}
return nil
} | [
"func",
"(",
"d",
"*",
"Datapath",
")",
"Unenforce",
"(",
"contextID",
"string",
")",
"error",
"{",
"var",
"err",
"error",
"\n\n",
"puContext",
",",
"err",
":=",
"d",
".",
"puFromContextID",
".",
"Get",
"(",
"contextID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"// Cleanup the IP based lookup",
"pu",
":=",
"puContext",
".",
"(",
"*",
"pucontext",
".",
"PUContext",
")",
"\n\n",
"// Cleanup the mark information",
"if",
"err",
"=",
"d",
".",
"puFromMark",
".",
"Remove",
"(",
"pu",
".",
"Mark",
"(",
")",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"pu",
".",
"Mark",
"(",
")",
")",
",",
"zap",
".",
"Error",
"(",
"err",
")",
",",
")",
"\n",
"}",
"\n\n",
"// Cleanup the username",
"if",
"pu",
".",
"Type",
"(",
")",
"==",
"common",
".",
"UIDLoginPU",
"{",
"if",
"err",
"=",
"d",
".",
"puFromUser",
".",
"Remove",
"(",
"pu",
".",
"Username",
"(",
")",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"pu",
".",
"Username",
"(",
")",
")",
")",
"\n",
"}",
"\n",
"}",
"\n",
"// Cleanup the port cache",
"for",
"_",
",",
"port",
":=",
"range",
"pu",
".",
"TCPPorts",
"(",
")",
"{",
"if",
"port",
"==",
"\"",
"\"",
"{",
"continue",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"d",
".",
"contextIDFromTCPPort",
".",
"RemoveStringPorts",
"(",
"port",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"port",
")",
",",
"zap",
".",
"Error",
"(",
"err",
")",
",",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"port",
":=",
"range",
"pu",
".",
"UDPPorts",
"(",
")",
"{",
"if",
"err",
":=",
"d",
".",
"contextIDFromUDPPort",
".",
"RemoveStringPorts",
"(",
"port",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"port",
")",
",",
"zap",
".",
"Error",
"(",
"err",
")",
",",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"// Cleanup the contextID cache",
"if",
"err",
":=",
"d",
".",
"puFromContextID",
".",
"RemoveWithDelay",
"(",
"contextID",
",",
"10",
"*",
"time",
".",
"Second",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Warn",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"contextID",
")",
",",
"zap",
".",
"Error",
"(",
"err",
")",
",",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Unenforce removes the configuration for the given PU | [
"Unenforce",
"removes",
"the",
"configuration",
"for",
"the",
"given",
"PU"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/nfqdatapath/datapath.go#L389-L447 |
7,044 | aporeto-inc/trireme-lib | controller/internal/enforcer/nfqdatapath/datapath.go | SetTargetNetworks | func (d *Datapath) SetTargetNetworks(cfg *runtime.Configuration) error {
networks := cfg.TCPTargetNetworks
if len(networks) == 0 {
networks = []string{"0.0.0.0/1", "128.0.0.0/1"}
}
d.targetNetworks = acls.NewACLCache()
targetacl := createPolicy(networks)
return d.targetNetworks.AddRuleList(targetacl)
} | go | func (d *Datapath) SetTargetNetworks(cfg *runtime.Configuration) error {
networks := cfg.TCPTargetNetworks
if len(networks) == 0 {
networks = []string{"0.0.0.0/1", "128.0.0.0/1"}
}
d.targetNetworks = acls.NewACLCache()
targetacl := createPolicy(networks)
return d.targetNetworks.AddRuleList(targetacl)
} | [
"func",
"(",
"d",
"*",
"Datapath",
")",
"SetTargetNetworks",
"(",
"cfg",
"*",
"runtime",
".",
"Configuration",
")",
"error",
"{",
"networks",
":=",
"cfg",
".",
"TCPTargetNetworks",
"\n\n",
"if",
"len",
"(",
"networks",
")",
"==",
"0",
"{",
"networks",
"=",
"[",
"]",
"string",
"{",
"\"",
"\"",
",",
"\"",
"\"",
"}",
"\n",
"}",
"\n\n",
"d",
".",
"targetNetworks",
"=",
"acls",
".",
"NewACLCache",
"(",
")",
"\n",
"targetacl",
":=",
"createPolicy",
"(",
"networks",
")",
"\n",
"return",
"d",
".",
"targetNetworks",
".",
"AddRuleList",
"(",
"targetacl",
")",
"\n",
"}"
] | // SetTargetNetworks sets new target networks used by datapath | [
"SetTargetNetworks",
"sets",
"new",
"target",
"networks",
"used",
"by",
"datapath"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/nfqdatapath/datapath.go#L450-L461 |
7,045 | aporeto-inc/trireme-lib | controller/internal/enforcer/nfqdatapath/datapath.go | Run | func (d *Datapath) Run(ctx context.Context) error {
zap.L().Debug("Start enforcer", zap.Int("mode", int(d.mode)))
if d.conntrack == nil {
conntrackClient, err := flowtracking.NewClient(ctx)
if err != nil {
return err
}
d.conntrack = conntrackClient
}
d.startApplicationInterceptor(ctx)
d.startNetworkInterceptor(ctx)
go d.nflogger.Run(ctx)
return nil
} | go | func (d *Datapath) Run(ctx context.Context) error {
zap.L().Debug("Start enforcer", zap.Int("mode", int(d.mode)))
if d.conntrack == nil {
conntrackClient, err := flowtracking.NewClient(ctx)
if err != nil {
return err
}
d.conntrack = conntrackClient
}
d.startApplicationInterceptor(ctx)
d.startNetworkInterceptor(ctx)
go d.nflogger.Run(ctx)
return nil
} | [
"func",
"(",
"d",
"*",
"Datapath",
")",
"Run",
"(",
"ctx",
"context",
".",
"Context",
")",
"error",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"Int",
"(",
"\"",
"\"",
",",
"int",
"(",
"d",
".",
"mode",
")",
")",
")",
"\n\n",
"if",
"d",
".",
"conntrack",
"==",
"nil",
"{",
"conntrackClient",
",",
"err",
":=",
"flowtracking",
".",
"NewClient",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"d",
".",
"conntrack",
"=",
"conntrackClient",
"\n",
"}",
"\n\n",
"d",
".",
"startApplicationInterceptor",
"(",
"ctx",
")",
"\n",
"d",
".",
"startNetworkInterceptor",
"(",
"ctx",
")",
"\n\n",
"go",
"d",
".",
"nflogger",
".",
"Run",
"(",
"ctx",
")",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Run starts the application and network interceptors | [
"Run",
"starts",
"the",
"application",
"and",
"network",
"interceptors"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/nfqdatapath/datapath.go#L470-L488 |
7,046 | aporeto-inc/trireme-lib | controller/internal/enforcer/nfqdatapath/datapath.go | contextFromIP | func (d *Datapath) contextFromIP(app bool, mark string, port uint16, protocol uint8) (*pucontext.PUContext, error) {
if d.puFromIP != nil {
return d.puFromIP, nil
}
if app {
pu, err := d.puFromMark.Get(mark)
if err != nil {
zap.L().Error("Unable to find context for application flow with mark",
zap.String("mark", mark),
zap.Int("protocol", int(protocol)),
zap.Int("port", int(port)),
)
return nil, errMarkNotFound
}
return pu.(*pucontext.PUContext), nil
}
// Network packets for non container traffic
if protocol == packet.IPProtocolTCP {
contextID, err := d.contextIDFromTCPPort.GetSpecValueFromPort(port)
if err != nil {
zap.L().Debug("Could not find PU context for TCP server port ", zap.Uint16("port", port))
return nil, errPortNotFound
}
pu, err := d.puFromContextID.Get(contextID)
if err != nil {
return nil, errContextIDNotFound
}
return pu.(*pucontext.PUContext), nil
}
if protocol == packet.IPProtocolUDP {
contextID, err := d.contextIDFromUDPPort.GetSpecValueFromPort(port)
if err != nil {
zap.L().Debug("Could not find PU context for UDP server port ", zap.Uint16("port", port))
return nil, errPortNotFound
}
pu, err := d.puFromContextID.Get(contextID)
if err != nil {
return nil, errContextIDNotFound
}
return pu.(*pucontext.PUContext), nil
}
zap.L().Error("Invalid protocol ", zap.Uint8("protocol", protocol))
return nil, errInvalidProtocol
} | go | func (d *Datapath) contextFromIP(app bool, mark string, port uint16, protocol uint8) (*pucontext.PUContext, error) {
if d.puFromIP != nil {
return d.puFromIP, nil
}
if app {
pu, err := d.puFromMark.Get(mark)
if err != nil {
zap.L().Error("Unable to find context for application flow with mark",
zap.String("mark", mark),
zap.Int("protocol", int(protocol)),
zap.Int("port", int(port)),
)
return nil, errMarkNotFound
}
return pu.(*pucontext.PUContext), nil
}
// Network packets for non container traffic
if protocol == packet.IPProtocolTCP {
contextID, err := d.contextIDFromTCPPort.GetSpecValueFromPort(port)
if err != nil {
zap.L().Debug("Could not find PU context for TCP server port ", zap.Uint16("port", port))
return nil, errPortNotFound
}
pu, err := d.puFromContextID.Get(contextID)
if err != nil {
return nil, errContextIDNotFound
}
return pu.(*pucontext.PUContext), nil
}
if protocol == packet.IPProtocolUDP {
contextID, err := d.contextIDFromUDPPort.GetSpecValueFromPort(port)
if err != nil {
zap.L().Debug("Could not find PU context for UDP server port ", zap.Uint16("port", port))
return nil, errPortNotFound
}
pu, err := d.puFromContextID.Get(contextID)
if err != nil {
return nil, errContextIDNotFound
}
return pu.(*pucontext.PUContext), nil
}
zap.L().Error("Invalid protocol ", zap.Uint8("protocol", protocol))
return nil, errInvalidProtocol
} | [
"func",
"(",
"d",
"*",
"Datapath",
")",
"contextFromIP",
"(",
"app",
"bool",
",",
"mark",
"string",
",",
"port",
"uint16",
",",
"protocol",
"uint8",
")",
"(",
"*",
"pucontext",
".",
"PUContext",
",",
"error",
")",
"{",
"if",
"d",
".",
"puFromIP",
"!=",
"nil",
"{",
"return",
"d",
".",
"puFromIP",
",",
"nil",
"\n",
"}",
"\n\n",
"if",
"app",
"{",
"pu",
",",
"err",
":=",
"d",
".",
"puFromMark",
".",
"Get",
"(",
"mark",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"String",
"(",
"\"",
"\"",
",",
"mark",
")",
",",
"zap",
".",
"Int",
"(",
"\"",
"\"",
",",
"int",
"(",
"protocol",
")",
")",
",",
"zap",
".",
"Int",
"(",
"\"",
"\"",
",",
"int",
"(",
"port",
")",
")",
",",
")",
"\n",
"return",
"nil",
",",
"errMarkNotFound",
"\n",
"}",
"\n",
"return",
"pu",
".",
"(",
"*",
"pucontext",
".",
"PUContext",
")",
",",
"nil",
"\n",
"}",
"\n\n",
"// Network packets for non container traffic",
"if",
"protocol",
"==",
"packet",
".",
"IPProtocolTCP",
"{",
"contextID",
",",
"err",
":=",
"d",
".",
"contextIDFromTCPPort",
".",
"GetSpecValueFromPort",
"(",
"port",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"Uint16",
"(",
"\"",
"\"",
",",
"port",
")",
")",
"\n",
"return",
"nil",
",",
"errPortNotFound",
"\n",
"}",
"\n\n",
"pu",
",",
"err",
":=",
"d",
".",
"puFromContextID",
".",
"Get",
"(",
"contextID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"errContextIDNotFound",
"\n",
"}",
"\n",
"return",
"pu",
".",
"(",
"*",
"pucontext",
".",
"PUContext",
")",
",",
"nil",
"\n",
"}",
"\n\n",
"if",
"protocol",
"==",
"packet",
".",
"IPProtocolUDP",
"{",
"contextID",
",",
"err",
":=",
"d",
".",
"contextIDFromUDPPort",
".",
"GetSpecValueFromPort",
"(",
"port",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"Uint16",
"(",
"\"",
"\"",
",",
"port",
")",
")",
"\n",
"return",
"nil",
",",
"errPortNotFound",
"\n",
"}",
"\n\n",
"pu",
",",
"err",
":=",
"d",
".",
"puFromContextID",
".",
"Get",
"(",
"contextID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"errContextIDNotFound",
"\n",
"}",
"\n",
"return",
"pu",
".",
"(",
"*",
"pucontext",
".",
"PUContext",
")",
",",
"nil",
"\n",
"}",
"\n\n",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"Uint8",
"(",
"\"",
"\"",
",",
"protocol",
")",
")",
"\n\n",
"return",
"nil",
",",
"errInvalidProtocol",
"\n",
"}"
] | // contextFromIP returns the PU context from the default IP if remote. Otherwise
// it returns the context from the port or mark values of the packet. Synack
// packets are again special and the flow is reversed. If a container doesn't supply
// its IP information, we use the default IP. This will only work with remotes
// and Linux processes. | [
"contextFromIP",
"returns",
"the",
"PU",
"context",
"from",
"the",
"default",
"IP",
"if",
"remote",
".",
"Otherwise",
"it",
"returns",
"the",
"context",
"from",
"the",
"port",
"or",
"mark",
"values",
"of",
"the",
"packet",
".",
"Synack",
"packets",
"are",
"again",
"special",
"and",
"the",
"flow",
"is",
"reversed",
".",
"If",
"a",
"container",
"doesn",
"t",
"supply",
"its",
"IP",
"information",
"we",
"use",
"the",
"default",
"IP",
".",
"This",
"will",
"only",
"work",
"with",
"remotes",
"and",
"Linux",
"processes",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/nfqdatapath/datapath.go#L545-L596 |
7,047 | aporeto-inc/trireme-lib | utils/cgnetcls/cgnetcls.go | AssignMark | func (s *netCls) AssignMark(cgroupname string, mark uint64) error {
_, err := os.Stat(filepath.Join(basePath, s.TriremePath, cgroupname))
if os.IsNotExist(err) {
return fmt.Errorf("cgroup does not exist: %s", err)
}
//16 is the base since the mark file expects hexadecimal values
markval := "0x" + (strconv.FormatUint(mark, 16))
if err := ioutil.WriteFile(filepath.Join(basePath, s.TriremePath, cgroupname, markFile), []byte(markval), 0644); err != nil {
return fmt.Errorf("failed to write to net_cls.classid file for new cgroup: %s", err)
}
return nil
} | go | func (s *netCls) AssignMark(cgroupname string, mark uint64) error {
_, err := os.Stat(filepath.Join(basePath, s.TriremePath, cgroupname))
if os.IsNotExist(err) {
return fmt.Errorf("cgroup does not exist: %s", err)
}
//16 is the base since the mark file expects hexadecimal values
markval := "0x" + (strconv.FormatUint(mark, 16))
if err := ioutil.WriteFile(filepath.Join(basePath, s.TriremePath, cgroupname, markFile), []byte(markval), 0644); err != nil {
return fmt.Errorf("failed to write to net_cls.classid file for new cgroup: %s", err)
}
return nil
} | [
"func",
"(",
"s",
"*",
"netCls",
")",
"AssignMark",
"(",
"cgroupname",
"string",
",",
"mark",
"uint64",
")",
"error",
"{",
"_",
",",
"err",
":=",
"os",
".",
"Stat",
"(",
"filepath",
".",
"Join",
"(",
"basePath",
",",
"s",
".",
"TriremePath",
",",
"cgroupname",
")",
")",
"\n",
"if",
"os",
".",
"IsNotExist",
"(",
"err",
")",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"//16 is the base since the mark file expects hexadecimal values",
"markval",
":=",
"\"",
"\"",
"+",
"(",
"strconv",
".",
"FormatUint",
"(",
"mark",
",",
"16",
")",
")",
"\n\n",
"if",
"err",
":=",
"ioutil",
".",
"WriteFile",
"(",
"filepath",
".",
"Join",
"(",
"basePath",
",",
"s",
".",
"TriremePath",
",",
"cgroupname",
",",
"markFile",
")",
",",
"[",
"]",
"byte",
"(",
"markval",
")",
",",
"0644",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | //AssignMark writes the mark value to net_cls.classid file. | [
"AssignMark",
"writes",
"the",
"mark",
"value",
"to",
"net_cls",
".",
"classid",
"file",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/utils/cgnetcls/cgnetcls.go#L76-L91 |
7,048 | aporeto-inc/trireme-lib | utils/cgnetcls/cgnetcls.go | AddProcess | func (s *netCls) AddProcess(cgroupname string, pid int) error {
_, err := os.Stat(filepath.Join(basePath, s.TriremePath, cgroupname))
if os.IsNotExist(err) {
return fmt.Errorf("cannot add process. cgroup does not exist: %s", err)
}
PID := []byte(strconv.Itoa(pid))
if err := syscall.Kill(pid, 0); err != nil {
return nil
}
if err := ioutil.WriteFile(filepath.Join(basePath, s.TriremePath, cgroupname, procs), PID, 0644); err != nil {
return fmt.Errorf("cannot add process: %s", err)
}
return nil
} | go | func (s *netCls) AddProcess(cgroupname string, pid int) error {
_, err := os.Stat(filepath.Join(basePath, s.TriremePath, cgroupname))
if os.IsNotExist(err) {
return fmt.Errorf("cannot add process. cgroup does not exist: %s", err)
}
PID := []byte(strconv.Itoa(pid))
if err := syscall.Kill(pid, 0); err != nil {
return nil
}
if err := ioutil.WriteFile(filepath.Join(basePath, s.TriremePath, cgroupname, procs), PID, 0644); err != nil {
return fmt.Errorf("cannot add process: %s", err)
}
return nil
} | [
"func",
"(",
"s",
"*",
"netCls",
")",
"AddProcess",
"(",
"cgroupname",
"string",
",",
"pid",
"int",
")",
"error",
"{",
"_",
",",
"err",
":=",
"os",
".",
"Stat",
"(",
"filepath",
".",
"Join",
"(",
"basePath",
",",
"s",
".",
"TriremePath",
",",
"cgroupname",
")",
")",
"\n",
"if",
"os",
".",
"IsNotExist",
"(",
"err",
")",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"PID",
":=",
"[",
"]",
"byte",
"(",
"strconv",
".",
"Itoa",
"(",
"pid",
")",
")",
"\n",
"if",
"err",
":=",
"syscall",
".",
"Kill",
"(",
"pid",
",",
"0",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"ioutil",
".",
"WriteFile",
"(",
"filepath",
".",
"Join",
"(",
"basePath",
",",
"s",
".",
"TriremePath",
",",
"cgroupname",
",",
"procs",
")",
",",
"PID",
",",
"0644",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // AddProcess adds the process to the net_cls group | [
"AddProcess",
"adds",
"the",
"process",
"to",
"the",
"net_cls",
"group"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/utils/cgnetcls/cgnetcls.go#L94-L111 |
7,049 | aporeto-inc/trireme-lib | utils/cgnetcls/cgnetcls.go | RemoveProcess | func (s *netCls) RemoveProcess(cgroupname string, pid int) error {
_, err := os.Stat(filepath.Join(basePath, s.TriremePath, cgroupname))
if os.IsNotExist(err) {
return fmt.Errorf("cannot clean up process. cgroup does not exist: %s", err)
}
data, err := ioutil.ReadFile(filepath.Join(basePath, procs))
if err != nil {
return fmt.Errorf("cannot cleanup process: %s", err)
}
if !strings.Contains(string(data), strconv.Itoa(pid)) {
return errors.New("cannot cleanup process. process is not a part of this cgroup")
}
if err := ioutil.WriteFile(filepath.Join(basePath, procs), []byte(strconv.Itoa(pid)), 0644); err != nil {
return fmt.Errorf("cannot clean up process: %s", err)
}
return nil
} | go | func (s *netCls) RemoveProcess(cgroupname string, pid int) error {
_, err := os.Stat(filepath.Join(basePath, s.TriremePath, cgroupname))
if os.IsNotExist(err) {
return fmt.Errorf("cannot clean up process. cgroup does not exist: %s", err)
}
data, err := ioutil.ReadFile(filepath.Join(basePath, procs))
if err != nil {
return fmt.Errorf("cannot cleanup process: %s", err)
}
if !strings.Contains(string(data), strconv.Itoa(pid)) {
return errors.New("cannot cleanup process. process is not a part of this cgroup")
}
if err := ioutil.WriteFile(filepath.Join(basePath, procs), []byte(strconv.Itoa(pid)), 0644); err != nil {
return fmt.Errorf("cannot clean up process: %s", err)
}
return nil
} | [
"func",
"(",
"s",
"*",
"netCls",
")",
"RemoveProcess",
"(",
"cgroupname",
"string",
",",
"pid",
"int",
")",
"error",
"{",
"_",
",",
"err",
":=",
"os",
".",
"Stat",
"(",
"filepath",
".",
"Join",
"(",
"basePath",
",",
"s",
".",
"TriremePath",
",",
"cgroupname",
")",
")",
"\n",
"if",
"os",
".",
"IsNotExist",
"(",
"err",
")",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"data",
",",
"err",
":=",
"ioutil",
".",
"ReadFile",
"(",
"filepath",
".",
"Join",
"(",
"basePath",
",",
"procs",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"if",
"!",
"strings",
".",
"Contains",
"(",
"string",
"(",
"data",
")",
",",
"strconv",
".",
"Itoa",
"(",
"pid",
")",
")",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"ioutil",
".",
"WriteFile",
"(",
"filepath",
".",
"Join",
"(",
"basePath",
",",
"procs",
")",
",",
"[",
"]",
"byte",
"(",
"strconv",
".",
"Itoa",
"(",
"pid",
")",
")",
",",
"0644",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | //RemoveProcess removes the process from the cgroup by writing the pid to the
//top of net_cls cgroup cgroup.procs | [
"RemoveProcess",
"removes",
"the",
"process",
"from",
"the",
"cgroup",
"by",
"writing",
"the",
"pid",
"to",
"the",
"top",
"of",
"net_cls",
"cgroup",
"cgroup",
".",
"procs"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/utils/cgnetcls/cgnetcls.go#L115-L135 |
7,050 | aporeto-inc/trireme-lib | utils/cgnetcls/cgnetcls.go | DeleteCgroup | func (s *netCls) DeleteCgroup(cgroupname string) error {
_, err := os.Stat(filepath.Join(basePath, s.TriremePath, cgroupname))
if os.IsNotExist(err) {
zap.L().Debug("Group already deleted", zap.Error(err))
return nil
}
err = os.Remove(filepath.Join(basePath, s.TriremePath, cgroupname))
if err != nil {
return fmt.Errorf("unable to delete cgroup %s: %s", cgroupname, err)
}
return nil
} | go | func (s *netCls) DeleteCgroup(cgroupname string) error {
_, err := os.Stat(filepath.Join(basePath, s.TriremePath, cgroupname))
if os.IsNotExist(err) {
zap.L().Debug("Group already deleted", zap.Error(err))
return nil
}
err = os.Remove(filepath.Join(basePath, s.TriremePath, cgroupname))
if err != nil {
return fmt.Errorf("unable to delete cgroup %s: %s", cgroupname, err)
}
return nil
} | [
"func",
"(",
"s",
"*",
"netCls",
")",
"DeleteCgroup",
"(",
"cgroupname",
"string",
")",
"error",
"{",
"_",
",",
"err",
":=",
"os",
".",
"Stat",
"(",
"filepath",
".",
"Join",
"(",
"basePath",
",",
"s",
".",
"TriremePath",
",",
"cgroupname",
")",
")",
"\n",
"if",
"os",
".",
"IsNotExist",
"(",
"err",
")",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"return",
"nil",
"\n",
"}",
"\n\n",
"err",
"=",
"os",
".",
"Remove",
"(",
"filepath",
".",
"Join",
"(",
"basePath",
",",
"s",
".",
"TriremePath",
",",
"cgroupname",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"cgroupname",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // DeleteCgroup assumes the cgroup is already empty and destroys the directory structure.
// It will return an error if the group is not empty. Use RempoveProcess to remove all processes
// Before we try deletion | [
"DeleteCgroup",
"assumes",
"the",
"cgroup",
"is",
"already",
"empty",
"and",
"destroys",
"the",
"directory",
"structure",
".",
"It",
"will",
"return",
"an",
"error",
"if",
"the",
"group",
"is",
"not",
"empty",
".",
"Use",
"RempoveProcess",
"to",
"remove",
"all",
"processes",
"Before",
"we",
"try",
"deletion"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/utils/cgnetcls/cgnetcls.go#L140-L154 |
7,051 | aporeto-inc/trireme-lib | utils/cgnetcls/cgnetcls.go | Deletebasepath | func (s *netCls) Deletebasepath(cgroupName string) bool {
if cgroupName == s.TriremePath {
if err := os.Remove(filepath.Join(basePath, cgroupName)); err != nil {
zap.L().Error("Error when removing Trireme Base Path", zap.Error(err))
}
return true
}
return false
} | go | func (s *netCls) Deletebasepath(cgroupName string) bool {
if cgroupName == s.TriremePath {
if err := os.Remove(filepath.Join(basePath, cgroupName)); err != nil {
zap.L().Error("Error when removing Trireme Base Path", zap.Error(err))
}
return true
}
return false
} | [
"func",
"(",
"s",
"*",
"netCls",
")",
"Deletebasepath",
"(",
"cgroupName",
"string",
")",
"bool",
"{",
"if",
"cgroupName",
"==",
"s",
".",
"TriremePath",
"{",
"if",
"err",
":=",
"os",
".",
"Remove",
"(",
"filepath",
".",
"Join",
"(",
"basePath",
",",
"cgroupName",
")",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n",
"return",
"true",
"\n",
"}",
"\n\n",
"return",
"false",
"\n",
"}"
] | //Deletebasepath removes the base aporeto directory which comes as a separate event when we are not managing any processes | [
"Deletebasepath",
"removes",
"the",
"base",
"aporeto",
"directory",
"which",
"comes",
"as",
"a",
"separate",
"event",
"when",
"we",
"are",
"not",
"managing",
"any",
"processes"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/utils/cgnetcls/cgnetcls.go#L157-L167 |
7,052 | aporeto-inc/trireme-lib | utils/cgnetcls/cgnetcls.go | ListCgroupProcesses | func (s *netCls) ListCgroupProcesses(cgroupname string) ([]string, error) {
_, err := os.Stat(filepath.Join(basePath, s.TriremePath, cgroupname))
if os.IsNotExist(err) {
return []string{}, fmt.Errorf("cgroup %s does not exist: %s", cgroupname, err)
}
data, err := ioutil.ReadFile(filepath.Join(basePath, s.TriremePath, cgroupname, "cgroup.procs"))
if err != nil {
return []string{}, fmt.Errorf("cannot read procs file: %s", err)
}
procs := []string{}
for _, line := range strings.Split(string(data), "\n") {
if len(line) > 0 {
procs = append(procs, line)
}
}
return procs, nil
} | go | func (s *netCls) ListCgroupProcesses(cgroupname string) ([]string, error) {
_, err := os.Stat(filepath.Join(basePath, s.TriremePath, cgroupname))
if os.IsNotExist(err) {
return []string{}, fmt.Errorf("cgroup %s does not exist: %s", cgroupname, err)
}
data, err := ioutil.ReadFile(filepath.Join(basePath, s.TriremePath, cgroupname, "cgroup.procs"))
if err != nil {
return []string{}, fmt.Errorf("cannot read procs file: %s", err)
}
procs := []string{}
for _, line := range strings.Split(string(data), "\n") {
if len(line) > 0 {
procs = append(procs, line)
}
}
return procs, nil
} | [
"func",
"(",
"s",
"*",
"netCls",
")",
"ListCgroupProcesses",
"(",
"cgroupname",
"string",
")",
"(",
"[",
"]",
"string",
",",
"error",
")",
"{",
"_",
",",
"err",
":=",
"os",
".",
"Stat",
"(",
"filepath",
".",
"Join",
"(",
"basePath",
",",
"s",
".",
"TriremePath",
",",
"cgroupname",
")",
")",
"\n\n",
"if",
"os",
".",
"IsNotExist",
"(",
"err",
")",
"{",
"return",
"[",
"]",
"string",
"{",
"}",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"cgroupname",
",",
"err",
")",
"\n",
"}",
"\n\n",
"data",
",",
"err",
":=",
"ioutil",
".",
"ReadFile",
"(",
"filepath",
".",
"Join",
"(",
"basePath",
",",
"s",
".",
"TriremePath",
",",
"cgroupname",
",",
"\"",
"\"",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"[",
"]",
"string",
"{",
"}",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"procs",
":=",
"[",
"]",
"string",
"{",
"}",
"\n\n",
"for",
"_",
",",
"line",
":=",
"range",
"strings",
".",
"Split",
"(",
"string",
"(",
"data",
")",
",",
"\"",
"\\n",
"\"",
")",
"{",
"if",
"len",
"(",
"line",
")",
">",
"0",
"{",
"procs",
"=",
"append",
"(",
"procs",
",",
"line",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"procs",
",",
"nil",
"\n",
"}"
] | // ListCgroupProcesses returns lists of processes in the cgroup | [
"ListCgroupProcesses",
"returns",
"lists",
"of",
"processes",
"in",
"the",
"cgroup"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/utils/cgnetcls/cgnetcls.go#L170-L192 |
7,053 | aporeto-inc/trireme-lib | utils/cgnetcls/cgnetcls.go | ListAllCgroups | func (s *netCls) ListAllCgroups(path string) []string {
cgroups, err := ioutil.ReadDir(filepath.Join(basePath, s.TriremePath, path))
if err != nil {
return []string{}
}
names := make([]string, len(cgroups))
for i := 0; i < len(cgroups); i++ {
names[i] = cgroups[i].Name()
}
return names
} | go | func (s *netCls) ListAllCgroups(path string) []string {
cgroups, err := ioutil.ReadDir(filepath.Join(basePath, s.TriremePath, path))
if err != nil {
return []string{}
}
names := make([]string, len(cgroups))
for i := 0; i < len(cgroups); i++ {
names[i] = cgroups[i].Name()
}
return names
} | [
"func",
"(",
"s",
"*",
"netCls",
")",
"ListAllCgroups",
"(",
"path",
"string",
")",
"[",
"]",
"string",
"{",
"cgroups",
",",
"err",
":=",
"ioutil",
".",
"ReadDir",
"(",
"filepath",
".",
"Join",
"(",
"basePath",
",",
"s",
".",
"TriremePath",
",",
"path",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"[",
"]",
"string",
"{",
"}",
"\n",
"}",
"\n\n",
"names",
":=",
"make",
"(",
"[",
"]",
"string",
",",
"len",
"(",
"cgroups",
")",
")",
"\n",
"for",
"i",
":=",
"0",
";",
"i",
"<",
"len",
"(",
"cgroups",
")",
";",
"i",
"++",
"{",
"names",
"[",
"i",
"]",
"=",
"cgroups",
"[",
"i",
"]",
".",
"Name",
"(",
")",
"\n",
"}",
"\n\n",
"return",
"names",
"\n",
"}"
] | // ListAllCgroups returns a list of the cgroups that are managed in the Trireme path | [
"ListAllCgroups",
"returns",
"a",
"list",
"of",
"the",
"cgroups",
"that",
"are",
"managed",
"in",
"the",
"Trireme",
"path"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/utils/cgnetcls/cgnetcls.go#L195-L208 |
7,054 | aporeto-inc/trireme-lib | utils/cgnetcls/cgnetcls.go | NewDockerCgroupNetController | func NewDockerCgroupNetController() Cgroupnetcls {
controller := &netCls{
markchan: make(chan uint64),
ReleaseAgentPath: "",
TriremePath: "",
}
return controller
} | go | func NewDockerCgroupNetController() Cgroupnetcls {
controller := &netCls{
markchan: make(chan uint64),
ReleaseAgentPath: "",
TriremePath: "",
}
return controller
} | [
"func",
"NewDockerCgroupNetController",
"(",
")",
"Cgroupnetcls",
"{",
"controller",
":=",
"&",
"netCls",
"{",
"markchan",
":",
"make",
"(",
"chan",
"uint64",
")",
",",
"ReleaseAgentPath",
":",
"\"",
"\"",
",",
"TriremePath",
":",
"\"",
"\"",
",",
"}",
"\n\n",
"return",
"controller",
"\n",
"}"
] | // NewDockerCgroupNetController returns a handle to call functions on the cgroup net_cls controller | [
"NewDockerCgroupNetController",
"returns",
"a",
"handle",
"to",
"call",
"functions",
"on",
"the",
"cgroup",
"net_cls",
"controller"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/utils/cgnetcls/cgnetcls.go#L264-L273 |
7,055 | aporeto-inc/trireme-lib | utils/cgnetcls/cgnetcls.go | NewCgroupNetController | func NewCgroupNetController(triremepath string, releasePath string) Cgroupnetcls {
if !mounted {
mounted = true
if err := mountCgroupController(); err != nil {
zap.L().Error("Unable to mount net_cls controller - Linux process isolation not possible",
zap.Error(err))
}
}
binpath, _ := osext.Executable()
controller := &netCls{
markchan: make(chan uint64),
ReleaseAgentPath: binpath,
TriremePath: "",
}
if releasePath != "" {
controller.ReleaseAgentPath = releasePath
}
if triremepath != "" {
controller.TriremePath = triremepath
}
return controller
} | go | func NewCgroupNetController(triremepath string, releasePath string) Cgroupnetcls {
if !mounted {
mounted = true
if err := mountCgroupController(); err != nil {
zap.L().Error("Unable to mount net_cls controller - Linux process isolation not possible",
zap.Error(err))
}
}
binpath, _ := osext.Executable()
controller := &netCls{
markchan: make(chan uint64),
ReleaseAgentPath: binpath,
TriremePath: "",
}
if releasePath != "" {
controller.ReleaseAgentPath = releasePath
}
if triremepath != "" {
controller.TriremePath = triremepath
}
return controller
} | [
"func",
"NewCgroupNetController",
"(",
"triremepath",
"string",
",",
"releasePath",
"string",
")",
"Cgroupnetcls",
"{",
"if",
"!",
"mounted",
"{",
"mounted",
"=",
"true",
"\n",
"if",
"err",
":=",
"mountCgroupController",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n",
"}",
"\n",
"binpath",
",",
"_",
":=",
"osext",
".",
"Executable",
"(",
")",
"\n",
"controller",
":=",
"&",
"netCls",
"{",
"markchan",
":",
"make",
"(",
"chan",
"uint64",
")",
",",
"ReleaseAgentPath",
":",
"binpath",
",",
"TriremePath",
":",
"\"",
"\"",
",",
"}",
"\n\n",
"if",
"releasePath",
"!=",
"\"",
"\"",
"{",
"controller",
".",
"ReleaseAgentPath",
"=",
"releasePath",
"\n",
"}",
"\n\n",
"if",
"triremepath",
"!=",
"\"",
"\"",
"{",
"controller",
".",
"TriremePath",
"=",
"triremepath",
"\n",
"}",
"\n\n",
"return",
"controller",
"\n",
"}"
] | //NewCgroupNetController returns a handle to call functions on the cgroup net_cls controller | [
"NewCgroupNetController",
"returns",
"a",
"handle",
"to",
"call",
"functions",
"on",
"the",
"cgroup",
"net_cls",
"controller"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/utils/cgnetcls/cgnetcls.go#L276-L300 |
7,056 | aporeto-inc/trireme-lib | controller/pkg/servicetokens/servicetokens.go | NewVerifier | func NewVerifier(s secrets.Secrets, globalCertificate *x509.Certificate) *Verifier {
return &Verifier{
secrets: s,
globalCert: globalCertificate,
// tokenCache will cache the token results to accelerate performance
tokenCache: gcache.New(2048).LRU().Expiration(20 * time.Second).Build(),
}
} | go | func NewVerifier(s secrets.Secrets, globalCertificate *x509.Certificate) *Verifier {
return &Verifier{
secrets: s,
globalCert: globalCertificate,
// tokenCache will cache the token results to accelerate performance
tokenCache: gcache.New(2048).LRU().Expiration(20 * time.Second).Build(),
}
} | [
"func",
"NewVerifier",
"(",
"s",
"secrets",
".",
"Secrets",
",",
"globalCertificate",
"*",
"x509",
".",
"Certificate",
")",
"*",
"Verifier",
"{",
"return",
"&",
"Verifier",
"{",
"secrets",
":",
"s",
",",
"globalCert",
":",
"globalCertificate",
",",
"// tokenCache will cache the token results to accelerate performance",
"tokenCache",
":",
"gcache",
".",
"New",
"(",
"2048",
")",
".",
"LRU",
"(",
")",
".",
"Expiration",
"(",
"20",
"*",
"time",
".",
"Second",
")",
".",
"Build",
"(",
")",
",",
"}",
"\n",
"}"
] | // NewVerifier creates a new Aporeto JWT Verifier. The globalCertificate is optional
// and is needed for configurations that do not transmit the token over the wire. | [
"NewVerifier",
"creates",
"a",
"new",
"Aporeto",
"JWT",
"Verifier",
".",
"The",
"globalCertificate",
"is",
"optional",
"and",
"is",
"needed",
"for",
"configurations",
"that",
"do",
"not",
"transmit",
"the",
"token",
"over",
"the",
"wire",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/servicetokens/servicetokens.go#L39-L46 |
7,057 | aporeto-inc/trireme-lib | controller/pkg/servicetokens/servicetokens.go | UpdateSecrets | func (p *Verifier) UpdateSecrets(s secrets.Secrets, globalCert *x509.Certificate) {
p.Lock()
defer p.Unlock()
p.secrets = s
p.globalCert = globalCert
} | go | func (p *Verifier) UpdateSecrets(s secrets.Secrets, globalCert *x509.Certificate) {
p.Lock()
defer p.Unlock()
p.secrets = s
p.globalCert = globalCert
} | [
"func",
"(",
"p",
"*",
"Verifier",
")",
"UpdateSecrets",
"(",
"s",
"secrets",
".",
"Secrets",
",",
"globalCert",
"*",
"x509",
".",
"Certificate",
")",
"{",
"p",
".",
"Lock",
"(",
")",
"\n",
"defer",
"p",
".",
"Unlock",
"(",
")",
"\n\n",
"p",
".",
"secrets",
"=",
"s",
"\n",
"p",
".",
"globalCert",
"=",
"globalCert",
"\n",
"}"
] | // UpdateSecrets updates the secrets of the token Verifier. | [
"UpdateSecrets",
"updates",
"the",
"secrets",
"of",
"the",
"token",
"Verifier",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/servicetokens/servicetokens.go#L108-L114 |
7,058 | aporeto-inc/trireme-lib | controller/pkg/servicetokens/servicetokens.go | CreateAndSign | func CreateAndSign(server string, profile, scopes []string, id string, validity time.Duration, gkey interface{}) (string, error) {
key, ok := gkey.(*ecdsa.PrivateKey)
if !ok {
return "", fmt.Errorf("Not a valid private key format")
}
if token, err := localCache.Get(id); err == nil {
return token.(string), nil
}
claims := &JWTClaims{
StandardClaims: jwt.StandardClaims{
Issuer: server,
ExpiresAt: time.Now().Add(validity).Unix(),
Subject: id,
},
Profile: profile,
Scopes: scopes,
}
token, err := jwt.NewWithClaims(jwt.SigningMethodES256, claims).SignedString(key)
if err != nil {
return "", err
}
localCache.AddOrUpdate(id, token)
return token, nil
} | go | func CreateAndSign(server string, profile, scopes []string, id string, validity time.Duration, gkey interface{}) (string, error) {
key, ok := gkey.(*ecdsa.PrivateKey)
if !ok {
return "", fmt.Errorf("Not a valid private key format")
}
if token, err := localCache.Get(id); err == nil {
return token.(string), nil
}
claims := &JWTClaims{
StandardClaims: jwt.StandardClaims{
Issuer: server,
ExpiresAt: time.Now().Add(validity).Unix(),
Subject: id,
},
Profile: profile,
Scopes: scopes,
}
token, err := jwt.NewWithClaims(jwt.SigningMethodES256, claims).SignedString(key)
if err != nil {
return "", err
}
localCache.AddOrUpdate(id, token)
return token, nil
} | [
"func",
"CreateAndSign",
"(",
"server",
"string",
",",
"profile",
",",
"scopes",
"[",
"]",
"string",
",",
"id",
"string",
",",
"validity",
"time",
".",
"Duration",
",",
"gkey",
"interface",
"{",
"}",
")",
"(",
"string",
",",
"error",
")",
"{",
"key",
",",
"ok",
":=",
"gkey",
".",
"(",
"*",
"ecdsa",
".",
"PrivateKey",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"\"",
"\"",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"token",
",",
"err",
":=",
"localCache",
".",
"Get",
"(",
"id",
")",
";",
"err",
"==",
"nil",
"{",
"return",
"token",
".",
"(",
"string",
")",
",",
"nil",
"\n",
"}",
"\n",
"claims",
":=",
"&",
"JWTClaims",
"{",
"StandardClaims",
":",
"jwt",
".",
"StandardClaims",
"{",
"Issuer",
":",
"server",
",",
"ExpiresAt",
":",
"time",
".",
"Now",
"(",
")",
".",
"Add",
"(",
"validity",
")",
".",
"Unix",
"(",
")",
",",
"Subject",
":",
"id",
",",
"}",
",",
"Profile",
":",
"profile",
",",
"Scopes",
":",
"scopes",
",",
"}",
"\n\n",
"token",
",",
"err",
":=",
"jwt",
".",
"NewWithClaims",
"(",
"jwt",
".",
"SigningMethodES256",
",",
"claims",
")",
".",
"SignedString",
"(",
"key",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"err",
"\n",
"}",
"\n\n",
"localCache",
".",
"AddOrUpdate",
"(",
"id",
",",
"token",
")",
"\n",
"return",
"token",
",",
"nil",
"\n",
"}"
] | // CreateAndSign creates a new JWT token based on the Aporeto identities. | [
"CreateAndSign",
"creates",
"a",
"new",
"JWT",
"token",
"based",
"on",
"the",
"Aporeto",
"identities",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/servicetokens/servicetokens.go#L117-L142 |
7,059 | aporeto-inc/trireme-lib | monitor/internal/cni/processor.go | generateContextID | func generateContextID(eventInfo *common.EventInfo) (string, error) {
if eventInfo.PUID == "" {
return "", errors.New("puid is empty from event info")
}
if len(eventInfo.PUID) < 12 {
return "", errors.New("puid smaller than 12 characters")
}
return eventInfo.PUID[:12], nil
} | go | func generateContextID(eventInfo *common.EventInfo) (string, error) {
if eventInfo.PUID == "" {
return "", errors.New("puid is empty from event info")
}
if len(eventInfo.PUID) < 12 {
return "", errors.New("puid smaller than 12 characters")
}
return eventInfo.PUID[:12], nil
} | [
"func",
"generateContextID",
"(",
"eventInfo",
"*",
"common",
".",
"EventInfo",
")",
"(",
"string",
",",
"error",
")",
"{",
"if",
"eventInfo",
".",
"PUID",
"==",
"\"",
"\"",
"{",
"return",
"\"",
"\"",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"eventInfo",
".",
"PUID",
")",
"<",
"12",
"{",
"return",
"\"",
"\"",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"eventInfo",
".",
"PUID",
"[",
":",
"12",
"]",
",",
"nil",
"\n",
"}"
] | // generateContextID creates the contextID from the event information | [
"generateContextID",
"creates",
"the",
"contextID",
"from",
"the",
"event",
"information"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/cni/processor.go#L88-L99 |
7,060 | aporeto-inc/trireme-lib | controller/pkg/flowtracking/flowtracking.go | NewClient | func NewClient(ctx context.Context) (*Client, error) {
c, err := conntrack.Dial(&netlink.Config{})
if err != nil {
return nil, fmt.Errorf("flow tracker is unable to dial netlink: %s", err)
}
client := &Client{conn: c}
go func() {
<-ctx.Done()
client.conn.Close() // nolint errcheck
}()
return client, nil
} | go | func NewClient(ctx context.Context) (*Client, error) {
c, err := conntrack.Dial(&netlink.Config{})
if err != nil {
return nil, fmt.Errorf("flow tracker is unable to dial netlink: %s", err)
}
client := &Client{conn: c}
go func() {
<-ctx.Done()
client.conn.Close() // nolint errcheck
}()
return client, nil
} | [
"func",
"NewClient",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"*",
"Client",
",",
"error",
")",
"{",
"c",
",",
"err",
":=",
"conntrack",
".",
"Dial",
"(",
"&",
"netlink",
".",
"Config",
"{",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"client",
":=",
"&",
"Client",
"{",
"conn",
":",
"c",
"}",
"\n",
"go",
"func",
"(",
")",
"{",
"<-",
"ctx",
".",
"Done",
"(",
")",
"\n",
"client",
".",
"conn",
".",
"Close",
"(",
")",
"// nolint errcheck",
"\n",
"}",
"(",
")",
"\n\n",
"return",
"client",
",",
"nil",
"\n",
"}"
] | // NewClient creates a new flow tracking client. s | [
"NewClient",
"creates",
"a",
"new",
"flow",
"tracking",
"client",
".",
"s"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/flowtracking/flowtracking.go#L20-L33 |
7,061 | aporeto-inc/trireme-lib | controller/pkg/flowtracking/flowtracking.go | UpdateApplicationFlowMark | func (c *Client) UpdateApplicationFlowMark(ipSrc, ipDst net.IP, protonum uint8, srcport, dstport uint16, newmark uint32) error {
f := conntrack.NewFlow(protonum, 0, ipSrc, ipDst, srcport, dstport, 0, newmark)
return c.conn.Update(f)
} | go | func (c *Client) UpdateApplicationFlowMark(ipSrc, ipDst net.IP, protonum uint8, srcport, dstport uint16, newmark uint32) error {
f := conntrack.NewFlow(protonum, 0, ipSrc, ipDst, srcport, dstport, 0, newmark)
return c.conn.Update(f)
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"UpdateApplicationFlowMark",
"(",
"ipSrc",
",",
"ipDst",
"net",
".",
"IP",
",",
"protonum",
"uint8",
",",
"srcport",
",",
"dstport",
"uint16",
",",
"newmark",
"uint32",
")",
"error",
"{",
"f",
":=",
"conntrack",
".",
"NewFlow",
"(",
"protonum",
",",
"0",
",",
"ipSrc",
",",
"ipDst",
",",
"srcport",
",",
"dstport",
",",
"0",
",",
"newmark",
")",
"\n\n",
"return",
"c",
".",
"conn",
".",
"Update",
"(",
"f",
")",
"\n",
"}"
] | // UpdateApplicationFlowMark will update the mark for a flow based on the packet information
// received from an application. It will use the forward entries of conntrack for that. | [
"UpdateApplicationFlowMark",
"will",
"update",
"the",
"mark",
"for",
"a",
"flow",
"based",
"on",
"the",
"packet",
"information",
"received",
"from",
"an",
"application",
".",
"It",
"will",
"use",
"the",
"forward",
"entries",
"of",
"conntrack",
"for",
"that",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/flowtracking/flowtracking.go#L62-L67 |
7,062 | aporeto-inc/trireme-lib | controller/pkg/flowtracking/flowtracking.go | newReplyFlow | func newReplyFlow(proto uint8, status conntrack.StatusFlag, srcAddr, destAddr net.IP, srcPort, destPort uint16, timeout, mark uint32) conntrack.Flow {
var f conntrack.Flow
f.Status.Value = status
f.Timeout = timeout
f.Mark = mark
// Set up TupleReply with source and destination inverted
f.TupleReply.IP.SourceAddress = srcAddr
f.TupleReply.IP.DestinationAddress = destAddr
f.TupleReply.Proto.SourcePort = srcPort
f.TupleReply.Proto.DestinationPort = destPort
f.TupleReply.Proto.Protocol = proto
return f
} | go | func newReplyFlow(proto uint8, status conntrack.StatusFlag, srcAddr, destAddr net.IP, srcPort, destPort uint16, timeout, mark uint32) conntrack.Flow {
var f conntrack.Flow
f.Status.Value = status
f.Timeout = timeout
f.Mark = mark
// Set up TupleReply with source and destination inverted
f.TupleReply.IP.SourceAddress = srcAddr
f.TupleReply.IP.DestinationAddress = destAddr
f.TupleReply.Proto.SourcePort = srcPort
f.TupleReply.Proto.DestinationPort = destPort
f.TupleReply.Proto.Protocol = proto
return f
} | [
"func",
"newReplyFlow",
"(",
"proto",
"uint8",
",",
"status",
"conntrack",
".",
"StatusFlag",
",",
"srcAddr",
",",
"destAddr",
"net",
".",
"IP",
",",
"srcPort",
",",
"destPort",
"uint16",
",",
"timeout",
",",
"mark",
"uint32",
")",
"conntrack",
".",
"Flow",
"{",
"var",
"f",
"conntrack",
".",
"Flow",
"\n\n",
"f",
".",
"Status",
".",
"Value",
"=",
"status",
"\n\n",
"f",
".",
"Timeout",
"=",
"timeout",
"\n",
"f",
".",
"Mark",
"=",
"mark",
"\n\n",
"// Set up TupleReply with source and destination inverted",
"f",
".",
"TupleReply",
".",
"IP",
".",
"SourceAddress",
"=",
"srcAddr",
"\n",
"f",
".",
"TupleReply",
".",
"IP",
".",
"DestinationAddress",
"=",
"destAddr",
"\n",
"f",
".",
"TupleReply",
".",
"Proto",
".",
"SourcePort",
"=",
"srcPort",
"\n",
"f",
".",
"TupleReply",
".",
"Proto",
".",
"DestinationPort",
"=",
"destPort",
"\n",
"f",
".",
"TupleReply",
".",
"Proto",
".",
"Protocol",
"=",
"proto",
"\n\n",
"return",
"f",
"\n",
"}"
] | // newReplyFlow will create a flow based on the reply tuple only. This will help us
// update the mark without requiring knowledge of nats. | [
"newReplyFlow",
"will",
"create",
"a",
"flow",
"based",
"on",
"the",
"reply",
"tuple",
"only",
".",
"This",
"will",
"help",
"us",
"update",
"the",
"mark",
"without",
"requiring",
"knowledge",
"of",
"nats",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/flowtracking/flowtracking.go#L71-L88 |
7,063 | aporeto-inc/trireme-lib | monitor/config/config.go | String | func (c *MonitorConfig) String() string {
buf := fmt.Sprintf("MergeTags:[%s] ", strings.Join(c.MergeTags, ","))
buf += fmt.Sprintf("Common:%+v ", c.Common)
buf += fmt.Sprintf("Monitors:{")
for k, v := range c.Monitors {
buf += fmt.Sprintf("{%d:%+v},", k, v)
}
buf += fmt.Sprintf("}")
return buf
} | go | func (c *MonitorConfig) String() string {
buf := fmt.Sprintf("MergeTags:[%s] ", strings.Join(c.MergeTags, ","))
buf += fmt.Sprintf("Common:%+v ", c.Common)
buf += fmt.Sprintf("Monitors:{")
for k, v := range c.Monitors {
buf += fmt.Sprintf("{%d:%+v},", k, v)
}
buf += fmt.Sprintf("}")
return buf
} | [
"func",
"(",
"c",
"*",
"MonitorConfig",
")",
"String",
"(",
")",
"string",
"{",
"buf",
":=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"strings",
".",
"Join",
"(",
"c",
".",
"MergeTags",
",",
"\"",
"\"",
")",
")",
"\n",
"buf",
"+=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"c",
".",
"Common",
")",
"\n",
"buf",
"+=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
")",
"\n",
"for",
"k",
",",
"v",
":=",
"range",
"c",
".",
"Monitors",
"{",
"buf",
"+=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"k",
",",
"v",
")",
"\n",
"}",
"\n",
"buf",
"+=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
")",
"\n",
"return",
"buf",
"\n",
"}"
] | // String returns the configuration in string | [
"String",
"returns",
"the",
"configuration",
"in",
"string"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/config/config.go#L34-L43 |
7,064 | aporeto-inc/trireme-lib | monitor/config/config.go | IsComplete | func (c *ProcessorConfig) IsComplete() error {
if c.Collector == nil {
return fmt.Errorf("Missing configuration: collector")
}
if c.Policy == nil {
return fmt.Errorf("Missing configuration: puHandler")
}
return nil
} | go | func (c *ProcessorConfig) IsComplete() error {
if c.Collector == nil {
return fmt.Errorf("Missing configuration: collector")
}
if c.Policy == nil {
return fmt.Errorf("Missing configuration: puHandler")
}
return nil
} | [
"func",
"(",
"c",
"*",
"ProcessorConfig",
")",
"IsComplete",
"(",
")",
"error",
"{",
"if",
"c",
".",
"Collector",
"==",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"if",
"c",
".",
"Policy",
"==",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // IsComplete checks if configuration is complete | [
"IsComplete",
"checks",
"if",
"configuration",
"is",
"complete"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/config/config.go#L53-L64 |
7,065 | aporeto-inc/trireme-lib | controller/pkg/remoteenforcer/internal/statscollector/collector_trireme.go | CollectFlowEvent | func (c *collectorImpl) CollectFlowEvent(record *collector.FlowRecord) {
hash := collector.StatsFlowHash(record)
// If flow event doesn't have a count make it equal to 1. At least one flow is collected
if record.Count == 0 {
record.Count = 1
}
c.Lock()
defer c.Unlock()
if r, ok := c.Flows[hash]; ok {
r.Count = r.Count + record.Count
return
}
c.Flows[hash] = record
c.Flows[hash].Tags = record.Tags
} | go | func (c *collectorImpl) CollectFlowEvent(record *collector.FlowRecord) {
hash := collector.StatsFlowHash(record)
// If flow event doesn't have a count make it equal to 1. At least one flow is collected
if record.Count == 0 {
record.Count = 1
}
c.Lock()
defer c.Unlock()
if r, ok := c.Flows[hash]; ok {
r.Count = r.Count + record.Count
return
}
c.Flows[hash] = record
c.Flows[hash].Tags = record.Tags
} | [
"func",
"(",
"c",
"*",
"collectorImpl",
")",
"CollectFlowEvent",
"(",
"record",
"*",
"collector",
".",
"FlowRecord",
")",
"{",
"hash",
":=",
"collector",
".",
"StatsFlowHash",
"(",
"record",
")",
"\n\n",
"// If flow event doesn't have a count make it equal to 1. At least one flow is collected",
"if",
"record",
".",
"Count",
"==",
"0",
"{",
"record",
".",
"Count",
"=",
"1",
"\n",
"}",
"\n\n",
"c",
".",
"Lock",
"(",
")",
"\n",
"defer",
"c",
".",
"Unlock",
"(",
")",
"\n\n",
"if",
"r",
",",
"ok",
":=",
"c",
".",
"Flows",
"[",
"hash",
"]",
";",
"ok",
"{",
"r",
".",
"Count",
"=",
"r",
".",
"Count",
"+",
"record",
".",
"Count",
"\n",
"return",
"\n",
"}",
"\n\n",
"c",
".",
"Flows",
"[",
"hash",
"]",
"=",
"record",
"\n\n",
"c",
".",
"Flows",
"[",
"hash",
"]",
".",
"Tags",
"=",
"record",
".",
"Tags",
"\n",
"}"
] | // CollectFlowEvent collects a new flow event and adds it to a local list it shares with SendStats | [
"CollectFlowEvent",
"collects",
"a",
"new",
"flow",
"event",
"and",
"adds",
"it",
"to",
"a",
"local",
"list",
"it",
"shares",
"with",
"SendStats"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/remoteenforcer/internal/statscollector/collector_trireme.go#L9-L29 |
7,066 | aporeto-inc/trireme-lib | controller/pkg/remoteenforcer/internal/statscollector/collector_trireme.go | CollectUserEvent | func (c *collectorImpl) CollectUserEvent(record *collector.UserRecord) {
if err := collector.StatsUserHash(record); err != nil {
zap.L().Error("Cannot store user record", zap.Error(err))
return
}
c.Lock()
defer c.Unlock()
if _, ok := c.ProcessedUsers[record.ID]; !ok {
c.Users[record.ID] = record
c.ProcessedUsers[record.ID] = true
}
} | go | func (c *collectorImpl) CollectUserEvent(record *collector.UserRecord) {
if err := collector.StatsUserHash(record); err != nil {
zap.L().Error("Cannot store user record", zap.Error(err))
return
}
c.Lock()
defer c.Unlock()
if _, ok := c.ProcessedUsers[record.ID]; !ok {
c.Users[record.ID] = record
c.ProcessedUsers[record.ID] = true
}
} | [
"func",
"(",
"c",
"*",
"collectorImpl",
")",
"CollectUserEvent",
"(",
"record",
"*",
"collector",
".",
"UserRecord",
")",
"{",
"if",
"err",
":=",
"collector",
".",
"StatsUserHash",
"(",
"record",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"return",
"\n",
"}",
"\n\n",
"c",
".",
"Lock",
"(",
")",
"\n",
"defer",
"c",
".",
"Unlock",
"(",
")",
"\n\n",
"if",
"_",
",",
"ok",
":=",
"c",
".",
"ProcessedUsers",
"[",
"record",
".",
"ID",
"]",
";",
"!",
"ok",
"{",
"c",
".",
"Users",
"[",
"record",
".",
"ID",
"]",
"=",
"record",
"\n",
"c",
".",
"ProcessedUsers",
"[",
"record",
".",
"ID",
"]",
"=",
"true",
"\n",
"}",
"\n",
"}"
] | // CollectUserEvent collects a new user event and adds it to a local cache. | [
"CollectUserEvent",
"collects",
"a",
"new",
"user",
"event",
"and",
"adds",
"it",
"to",
"a",
"local",
"cache",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/remoteenforcer/internal/statscollector/collector_trireme.go#L37-L50 |
7,067 | aporeto-inc/trireme-lib | controller/pkg/remoteenforcer/internal/statscollector/collector_trireme.go | CollectPacketEvent | func (c *collectorImpl) CollectPacketEvent(report *collector.PacketReport) {
//We will leave this unimplemented
// trace event collection in done from the main enforcer
c.Lock()
defer c.Unlock()
zap.L().Debug("Collected Packet Event")
c.DatapathPacketReports = append(c.DatapathPacketReports, report)
} | go | func (c *collectorImpl) CollectPacketEvent(report *collector.PacketReport) {
//We will leave this unimplemented
// trace event collection in done from the main enforcer
c.Lock()
defer c.Unlock()
zap.L().Debug("Collected Packet Event")
c.DatapathPacketReports = append(c.DatapathPacketReports, report)
} | [
"func",
"(",
"c",
"*",
"collectorImpl",
")",
"CollectPacketEvent",
"(",
"report",
"*",
"collector",
".",
"PacketReport",
")",
"{",
"//We will leave this unimplemented",
"// trace event collection in done from the main enforcer",
"c",
".",
"Lock",
"(",
")",
"\n",
"defer",
"c",
".",
"Unlock",
"(",
")",
"\n",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"c",
".",
"DatapathPacketReports",
"=",
"append",
"(",
"c",
".",
"DatapathPacketReports",
",",
"report",
")",
"\n\n",
"}"
] | // CollectTraceEvent collect trace events | [
"CollectTraceEvent",
"collect",
"trace",
"events"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/pkg/remoteenforcer/internal/statscollector/collector_trireme.go#L59-L67 |
7,068 | aporeto-inc/trireme-lib | monitor/internal/kubernetes/client.go | NewKubeClient | func NewKubeClient(kubeconfig string) (*kubernetes.Clientset, error) {
config, err := clientcmd.BuildConfigFromFlags("", kubeconfig)
if err != nil {
return nil, fmt.Errorf("Error Building config from Kubeconfig: %v", err)
}
return kubernetes.NewForConfig(config)
} | go | func NewKubeClient(kubeconfig string) (*kubernetes.Clientset, error) {
config, err := clientcmd.BuildConfigFromFlags("", kubeconfig)
if err != nil {
return nil, fmt.Errorf("Error Building config from Kubeconfig: %v", err)
}
return kubernetes.NewForConfig(config)
} | [
"func",
"NewKubeClient",
"(",
"kubeconfig",
"string",
")",
"(",
"*",
"kubernetes",
".",
"Clientset",
",",
"error",
")",
"{",
"config",
",",
"err",
":=",
"clientcmd",
".",
"BuildConfigFromFlags",
"(",
"\"",
"\"",
",",
"kubeconfig",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"kubernetes",
".",
"NewForConfig",
"(",
"config",
")",
"\n",
"}"
] | // NewKubeClient Generate and initialize a Kubernetes client based on the parameter kubeconfig | [
"NewKubeClient",
"Generate",
"and",
"initialize",
"a",
"Kubernetes",
"client",
"based",
"on",
"the",
"parameter",
"kubeconfig"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/kubernetes/client.go#L17-L24 |
7,069 | aporeto-inc/trireme-lib | monitor/internal/kubernetes/client.go | CreateLocalPodController | func (m *KubernetesMonitor) CreateLocalPodController(namespace string,
addFunc func(addedApiStruct *api.Pod) error, deleteFunc func(deletedApiStruct *api.Pod) error, updateFunc func(oldApiStruct, updatedApiStruct *api.Pod) error) (kubecache.Store, kubecache.Controller) {
return CreateResourceController(m.kubeClient.CoreV1().RESTClient(), "pods", namespace, &api.Pod{}, m.localNodeSelector(),
func(addedApiStruct interface{}) {
if err := addFunc(addedApiStruct.(*api.Pod)); err != nil {
zap.L().Error("Error while handling Add Pod", zap.Error(err))
}
},
func(deletedApiStruct interface{}) {
if err := deleteFunc(deletedApiStruct.(*api.Pod)); err != nil {
zap.L().Error("Error while handling Delete Pod", zap.Error(err))
}
},
func(oldApiStruct, updatedApiStruct interface{}) {
if err := updateFunc(oldApiStruct.(*api.Pod), updatedApiStruct.(*api.Pod)); err != nil {
zap.L().Error("Error while handling Update Pod", zap.Error(err))
}
})
} | go | func (m *KubernetesMonitor) CreateLocalPodController(namespace string,
addFunc func(addedApiStruct *api.Pod) error, deleteFunc func(deletedApiStruct *api.Pod) error, updateFunc func(oldApiStruct, updatedApiStruct *api.Pod) error) (kubecache.Store, kubecache.Controller) {
return CreateResourceController(m.kubeClient.CoreV1().RESTClient(), "pods", namespace, &api.Pod{}, m.localNodeSelector(),
func(addedApiStruct interface{}) {
if err := addFunc(addedApiStruct.(*api.Pod)); err != nil {
zap.L().Error("Error while handling Add Pod", zap.Error(err))
}
},
func(deletedApiStruct interface{}) {
if err := deleteFunc(deletedApiStruct.(*api.Pod)); err != nil {
zap.L().Error("Error while handling Delete Pod", zap.Error(err))
}
},
func(oldApiStruct, updatedApiStruct interface{}) {
if err := updateFunc(oldApiStruct.(*api.Pod), updatedApiStruct.(*api.Pod)); err != nil {
zap.L().Error("Error while handling Update Pod", zap.Error(err))
}
})
} | [
"func",
"(",
"m",
"*",
"KubernetesMonitor",
")",
"CreateLocalPodController",
"(",
"namespace",
"string",
",",
"addFunc",
"func",
"(",
"addedApiStruct",
"*",
"api",
".",
"Pod",
")",
"error",
",",
"deleteFunc",
"func",
"(",
"deletedApiStruct",
"*",
"api",
".",
"Pod",
")",
"error",
",",
"updateFunc",
"func",
"(",
"oldApiStruct",
",",
"updatedApiStruct",
"*",
"api",
".",
"Pod",
")",
"error",
")",
"(",
"kubecache",
".",
"Store",
",",
"kubecache",
".",
"Controller",
")",
"{",
"return",
"CreateResourceController",
"(",
"m",
".",
"kubeClient",
".",
"CoreV1",
"(",
")",
".",
"RESTClient",
"(",
")",
",",
"\"",
"\"",
",",
"namespace",
",",
"&",
"api",
".",
"Pod",
"{",
"}",
",",
"m",
".",
"localNodeSelector",
"(",
")",
",",
"func",
"(",
"addedApiStruct",
"interface",
"{",
"}",
")",
"{",
"if",
"err",
":=",
"addFunc",
"(",
"addedApiStruct",
".",
"(",
"*",
"api",
".",
"Pod",
")",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n",
"}",
",",
"func",
"(",
"deletedApiStruct",
"interface",
"{",
"}",
")",
"{",
"if",
"err",
":=",
"deleteFunc",
"(",
"deletedApiStruct",
".",
"(",
"*",
"api",
".",
"Pod",
")",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n",
"}",
",",
"func",
"(",
"oldApiStruct",
",",
"updatedApiStruct",
"interface",
"{",
"}",
")",
"{",
"if",
"err",
":=",
"updateFunc",
"(",
"oldApiStruct",
".",
"(",
"*",
"api",
".",
"Pod",
")",
",",
"updatedApiStruct",
".",
"(",
"*",
"api",
".",
"Pod",
")",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n",
"}",
")",
"\n",
"}"
] | // CreateLocalPodController creates a controller specifically for Pods. | [
"CreateLocalPodController",
"creates",
"a",
"controller",
"specifically",
"for",
"Pods",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/kubernetes/client.go#L43-L62 |
7,070 | aporeto-inc/trireme-lib | monitor/internal/kubernetes/client.go | Pod | func (m *KubernetesMonitor) Pod(podName string, namespace string) (*api.Pod, error) {
targetPod, err := m.kubeClient.CoreV1().Pods(namespace).Get(podName, metav1.GetOptions{})
if err != nil {
return nil, fmt.Errorf("error getting Kubernetes labels & IP for pod %v : %v ", podName, err)
}
return targetPod, nil
} | go | func (m *KubernetesMonitor) Pod(podName string, namespace string) (*api.Pod, error) {
targetPod, err := m.kubeClient.CoreV1().Pods(namespace).Get(podName, metav1.GetOptions{})
if err != nil {
return nil, fmt.Errorf("error getting Kubernetes labels & IP for pod %v : %v ", podName, err)
}
return targetPod, nil
} | [
"func",
"(",
"m",
"*",
"KubernetesMonitor",
")",
"Pod",
"(",
"podName",
"string",
",",
"namespace",
"string",
")",
"(",
"*",
"api",
".",
"Pod",
",",
"error",
")",
"{",
"targetPod",
",",
"err",
":=",
"m",
".",
"kubeClient",
".",
"CoreV1",
"(",
")",
".",
"Pods",
"(",
"namespace",
")",
".",
"Get",
"(",
"podName",
",",
"metav1",
".",
"GetOptions",
"{",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"podName",
",",
"err",
")",
"\n",
"}",
"\n",
"return",
"targetPod",
",",
"nil",
"\n",
"}"
] | // Pod returns the full pod object. | [
"Pod",
"returns",
"the",
"full",
"pod",
"object",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/internal/kubernetes/client.go#L71-L77 |
7,071 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/markedconn/markedconn_osx.go | DialMarkedWithContext | func DialMarkedWithContext(ctx context.Context, network string, addr string, mark int) (net.Conn, error) {
return nil, nil
} | go | func DialMarkedWithContext(ctx context.Context, network string, addr string, mark int) (net.Conn, error) {
return nil, nil
} | [
"func",
"DialMarkedWithContext",
"(",
"ctx",
"context",
".",
"Context",
",",
"network",
"string",
",",
"addr",
"string",
",",
"mark",
"int",
")",
"(",
"net",
".",
"Conn",
",",
"error",
")",
"{",
"return",
"nil",
",",
"nil",
"\n",
"}"
] | // DialMarkedWithContext dials a TCP connection and associates a mark. Propagates the context. | [
"DialMarkedWithContext",
"dials",
"a",
"TCP",
"connection",
"and",
"associates",
"a",
"mark",
".",
"Propagates",
"the",
"context",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/markedconn/markedconn_osx.go#L11-L13 |
7,072 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/markedconn/markedconn_osx.go | NewSocketListener | func NewSocketListener(ctx context.Context, port string, mark int) (net.Listener, error) {
return nil, nil
} | go | func NewSocketListener(ctx context.Context, port string, mark int) (net.Listener, error) {
return nil, nil
} | [
"func",
"NewSocketListener",
"(",
"ctx",
"context",
".",
"Context",
",",
"port",
"string",
",",
"mark",
"int",
")",
"(",
"net",
".",
"Listener",
",",
"error",
")",
"{",
"return",
"nil",
",",
"nil",
"\n",
"}"
] | // NewSocketListener creates a socket listener with marked connections. | [
"NewSocketListener",
"creates",
"a",
"socket",
"listener",
"with",
"marked",
"connections",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/markedconn/markedconn_osx.go#L16-L18 |
7,073 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/markedconn/markedconn_osx.go | GetOriginalDestination | func (p *ProxiedConnection) GetOriginalDestination() (net.IP, int) {
return p.originalIP, p.originalPort
} | go | func (p *ProxiedConnection) GetOriginalDestination() (net.IP, int) {
return p.originalIP, p.originalPort
} | [
"func",
"(",
"p",
"*",
"ProxiedConnection",
")",
"GetOriginalDestination",
"(",
")",
"(",
"net",
".",
"IP",
",",
"int",
")",
"{",
"return",
"p",
".",
"originalIP",
",",
"p",
".",
"originalPort",
"\n",
"}"
] | // GetOriginalDestination sets the original destination of the connection. | [
"GetOriginalDestination",
"sets",
"the",
"original",
"destination",
"of",
"the",
"connection",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/markedconn/markedconn_osx.go#L34-L36 |
7,074 | aporeto-inc/trireme-lib | monitor/remoteapi/server/uidlistener.go | Read | func (c UIDConnection) Read(b []byte) (n int, err error) {
return c.nc.Read(b)
} | go | func (c UIDConnection) Read(b []byte) (n int, err error) {
return c.nc.Read(b)
} | [
"func",
"(",
"c",
"UIDConnection",
")",
"Read",
"(",
"b",
"[",
"]",
"byte",
")",
"(",
"n",
"int",
",",
"err",
"error",
")",
"{",
"return",
"c",
".",
"nc",
".",
"Read",
"(",
"b",
")",
"\n",
"}"
] | // Read implements the read interface of the connection. | [
"Read",
"implements",
"the",
"read",
"interface",
"of",
"the",
"connection",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/remoteapi/server/uidlistener.go#L19-L21 |
7,075 | aporeto-inc/trireme-lib | monitor/remoteapi/server/uidlistener.go | RemoteAddr | func (c UIDConnection) RemoteAddr() net.Addr {
uidAddr := &UIDAddr{
NetworkAddress: c.nc.RemoteAddr().Network(),
}
f, err := c.nc.File()
if err != nil {
uidAddr.Address = "NotAvailable"
}
defer f.Close() // nolint
cred, err := syscall.GetsockoptUcred(int(f.Fd()), syscall.SOL_SOCKET, syscall.SO_PEERCRED)
if err != nil {
uidAddr.Address = "NotAvailable"
}
uidAddr.Address = strconv.Itoa(int(cred.Uid)) + ":" + strconv.Itoa(int(cred.Gid)) + ":" + strconv.Itoa(int(cred.Pid))
return uidAddr
} | go | func (c UIDConnection) RemoteAddr() net.Addr {
uidAddr := &UIDAddr{
NetworkAddress: c.nc.RemoteAddr().Network(),
}
f, err := c.nc.File()
if err != nil {
uidAddr.Address = "NotAvailable"
}
defer f.Close() // nolint
cred, err := syscall.GetsockoptUcred(int(f.Fd()), syscall.SOL_SOCKET, syscall.SO_PEERCRED)
if err != nil {
uidAddr.Address = "NotAvailable"
}
uidAddr.Address = strconv.Itoa(int(cred.Uid)) + ":" + strconv.Itoa(int(cred.Gid)) + ":" + strconv.Itoa(int(cred.Pid))
return uidAddr
} | [
"func",
"(",
"c",
"UIDConnection",
")",
"RemoteAddr",
"(",
")",
"net",
".",
"Addr",
"{",
"uidAddr",
":=",
"&",
"UIDAddr",
"{",
"NetworkAddress",
":",
"c",
".",
"nc",
".",
"RemoteAddr",
"(",
")",
".",
"Network",
"(",
")",
",",
"}",
"\n\n",
"f",
",",
"err",
":=",
"c",
".",
"nc",
".",
"File",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"uidAddr",
".",
"Address",
"=",
"\"",
"\"",
"\n",
"}",
"\n",
"defer",
"f",
".",
"Close",
"(",
")",
"// nolint",
"\n\n",
"cred",
",",
"err",
":=",
"syscall",
".",
"GetsockoptUcred",
"(",
"int",
"(",
"f",
".",
"Fd",
"(",
")",
")",
",",
"syscall",
".",
"SOL_SOCKET",
",",
"syscall",
".",
"SO_PEERCRED",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"uidAddr",
".",
"Address",
"=",
"\"",
"\"",
"\n",
"}",
"\n\n",
"uidAddr",
".",
"Address",
"=",
"strconv",
".",
"Itoa",
"(",
"int",
"(",
"cred",
".",
"Uid",
")",
")",
"+",
"\"",
"\"",
"+",
"strconv",
".",
"Itoa",
"(",
"int",
"(",
"cred",
".",
"Gid",
")",
")",
"+",
"\"",
"\"",
"+",
"strconv",
".",
"Itoa",
"(",
"int",
"(",
"cred",
".",
"Pid",
")",
")",
"\n\n",
"return",
"uidAddr",
"\n\n",
"}"
] | // RemoteAddr implements the RemoteAddr interface of the connection.
// This is the main change where we actually use the FD of the unix
// socket to find the remote UID. | [
"RemoteAddr",
"implements",
"the",
"RemoteAddr",
"interface",
"of",
"the",
"connection",
".",
"This",
"is",
"the",
"main",
"change",
"where",
"we",
"actually",
"use",
"the",
"FD",
"of",
"the",
"unix",
"socket",
"to",
"find",
"the",
"remote",
"UID",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/remoteapi/server/uidlistener.go#L41-L62 |
7,076 | aporeto-inc/trireme-lib | monitor/remoteapi/server/uidlistener.go | SetDeadline | func (c UIDConnection) SetDeadline(t time.Time) error {
return c.nc.SetDeadline(t)
} | go | func (c UIDConnection) SetDeadline(t time.Time) error {
return c.nc.SetDeadline(t)
} | [
"func",
"(",
"c",
"UIDConnection",
")",
"SetDeadline",
"(",
"t",
"time",
".",
"Time",
")",
"error",
"{",
"return",
"c",
".",
"nc",
".",
"SetDeadline",
"(",
"t",
")",
"\n",
"}"
] | // SetDeadline implements the SetDeadLine interface. | [
"SetDeadline",
"implements",
"the",
"SetDeadLine",
"interface",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/remoteapi/server/uidlistener.go#L65-L67 |
7,077 | aporeto-inc/trireme-lib | monitor/remoteapi/server/uidlistener.go | SetReadDeadline | func (c UIDConnection) SetReadDeadline(t time.Time) error {
return c.nc.SetReadDeadline(t)
} | go | func (c UIDConnection) SetReadDeadline(t time.Time) error {
return c.nc.SetReadDeadline(t)
} | [
"func",
"(",
"c",
"UIDConnection",
")",
"SetReadDeadline",
"(",
"t",
"time",
".",
"Time",
")",
"error",
"{",
"return",
"c",
".",
"nc",
".",
"SetReadDeadline",
"(",
"t",
")",
"\n",
"}"
] | // SetReadDeadline implements the SetReadDeadling interface | [
"SetReadDeadline",
"implements",
"the",
"SetReadDeadling",
"interface"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/remoteapi/server/uidlistener.go#L70-L72 |
7,078 | aporeto-inc/trireme-lib | monitor/remoteapi/server/uidlistener.go | SetWriteDeadline | func (c UIDConnection) SetWriteDeadline(t time.Time) error {
return c.nc.SetWriteDeadline(t)
} | go | func (c UIDConnection) SetWriteDeadline(t time.Time) error {
return c.nc.SetWriteDeadline(t)
} | [
"func",
"(",
"c",
"UIDConnection",
")",
"SetWriteDeadline",
"(",
"t",
"time",
".",
"Time",
")",
"error",
"{",
"return",
"c",
".",
"nc",
".",
"SetWriteDeadline",
"(",
"t",
")",
"\n",
"}"
] | // SetWriteDeadline implements the SetWriteDeadline method of the interface. | [
"SetWriteDeadline",
"implements",
"the",
"SetWriteDeadline",
"method",
"of",
"the",
"interface",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/remoteapi/server/uidlistener.go#L75-L77 |
7,079 | aporeto-inc/trireme-lib | controller/internal/enforcer/acls/ports.go | newPortAction | func newPortAction(tcpport string, policy *policy.FlowPolicy) (*portAction, error) {
p := &portAction{}
if strings.Contains(tcpport, ":") {
parts := strings.Split(tcpport, ":")
if len(parts) != 2 {
return nil, fmt.Errorf("invalid port: %s", tcpport)
}
port, err := strconv.Atoi(parts[0])
if err != nil {
return nil, err
}
p.min = uint16(port)
port, err = strconv.Atoi(parts[1])
if err != nil {
return nil, err
}
p.max = uint16(port)
} else {
port, err := strconv.Atoi(tcpport)
if err != nil {
return nil, err
}
p.min = uint16(port)
p.max = p.min
}
if p.min > p.max {
return nil, errors.New("min port is greater than max port")
}
p.policy = policy
return p, nil
} | go | func newPortAction(tcpport string, policy *policy.FlowPolicy) (*portAction, error) {
p := &portAction{}
if strings.Contains(tcpport, ":") {
parts := strings.Split(tcpport, ":")
if len(parts) != 2 {
return nil, fmt.Errorf("invalid port: %s", tcpport)
}
port, err := strconv.Atoi(parts[0])
if err != nil {
return nil, err
}
p.min = uint16(port)
port, err = strconv.Atoi(parts[1])
if err != nil {
return nil, err
}
p.max = uint16(port)
} else {
port, err := strconv.Atoi(tcpport)
if err != nil {
return nil, err
}
p.min = uint16(port)
p.max = p.min
}
if p.min > p.max {
return nil, errors.New("min port is greater than max port")
}
p.policy = policy
return p, nil
} | [
"func",
"newPortAction",
"(",
"tcpport",
"string",
",",
"policy",
"*",
"policy",
".",
"FlowPolicy",
")",
"(",
"*",
"portAction",
",",
"error",
")",
"{",
"p",
":=",
"&",
"portAction",
"{",
"}",
"\n",
"if",
"strings",
".",
"Contains",
"(",
"tcpport",
",",
"\"",
"\"",
")",
"{",
"parts",
":=",
"strings",
".",
"Split",
"(",
"tcpport",
",",
"\"",
"\"",
")",
"\n",
"if",
"len",
"(",
"parts",
")",
"!=",
"2",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"tcpport",
")",
"\n",
"}",
"\n\n",
"port",
",",
"err",
":=",
"strconv",
".",
"Atoi",
"(",
"parts",
"[",
"0",
"]",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"p",
".",
"min",
"=",
"uint16",
"(",
"port",
")",
"\n\n",
"port",
",",
"err",
"=",
"strconv",
".",
"Atoi",
"(",
"parts",
"[",
"1",
"]",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"p",
".",
"max",
"=",
"uint16",
"(",
"port",
")",
"\n\n",
"}",
"else",
"{",
"port",
",",
"err",
":=",
"strconv",
".",
"Atoi",
"(",
"tcpport",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"p",
".",
"min",
"=",
"uint16",
"(",
"port",
")",
"\n",
"p",
".",
"max",
"=",
"p",
".",
"min",
"\n",
"}",
"\n\n",
"if",
"p",
".",
"min",
">",
"p",
".",
"max",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"p",
".",
"policy",
"=",
"policy",
"\n\n",
"return",
"p",
",",
"nil",
"\n",
"}"
] | // newPortAction parses a port spec and creates the action | [
"newPortAction",
"parses",
"a",
"port",
"spec",
"and",
"creates",
"the",
"action"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/acls/ports.go#L26-L64 |
7,080 | aporeto-inc/trireme-lib | monitor/extractors/linux.go | DefaultHostMetadataExtractor | func DefaultHostMetadataExtractor(event *common.EventInfo) (*policy.PURuntime, error) {
runtimeTags := policy.NewTagStore()
for _, tag := range event.Tags {
parts := strings.SplitN(tag, "=", 2)
if len(parts) != 2 {
return nil, fmt.Errorf("invalid tag: %s", tag)
}
runtimeTags.AppendKeyValue("@usr:"+parts[0], parts[1])
}
options := &policy.OptionsType{
CgroupName: event.PUID,
CgroupMark: strconv.FormatUint(cgnetcls.MarkVal(), 10),
Services: event.Services,
}
runtimeIps := policy.ExtendedMap{"bridge": "0.0.0.0/0"}
return policy.NewPURuntime(event.Name, int(event.PID), "", runtimeTags, runtimeIps, event.PUType, options), nil
} | go | func DefaultHostMetadataExtractor(event *common.EventInfo) (*policy.PURuntime, error) {
runtimeTags := policy.NewTagStore()
for _, tag := range event.Tags {
parts := strings.SplitN(tag, "=", 2)
if len(parts) != 2 {
return nil, fmt.Errorf("invalid tag: %s", tag)
}
runtimeTags.AppendKeyValue("@usr:"+parts[0], parts[1])
}
options := &policy.OptionsType{
CgroupName: event.PUID,
CgroupMark: strconv.FormatUint(cgnetcls.MarkVal(), 10),
Services: event.Services,
}
runtimeIps := policy.ExtendedMap{"bridge": "0.0.0.0/0"}
return policy.NewPURuntime(event.Name, int(event.PID), "", runtimeTags, runtimeIps, event.PUType, options), nil
} | [
"func",
"DefaultHostMetadataExtractor",
"(",
"event",
"*",
"common",
".",
"EventInfo",
")",
"(",
"*",
"policy",
".",
"PURuntime",
",",
"error",
")",
"{",
"runtimeTags",
":=",
"policy",
".",
"NewTagStore",
"(",
")",
"\n\n",
"for",
"_",
",",
"tag",
":=",
"range",
"event",
".",
"Tags",
"{",
"parts",
":=",
"strings",
".",
"SplitN",
"(",
"tag",
",",
"\"",
"\"",
",",
"2",
")",
"\n",
"if",
"len",
"(",
"parts",
")",
"!=",
"2",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"tag",
")",
"\n",
"}",
"\n",
"runtimeTags",
".",
"AppendKeyValue",
"(",
"\"",
"\"",
"+",
"parts",
"[",
"0",
"]",
",",
"parts",
"[",
"1",
"]",
")",
"\n",
"}",
"\n\n",
"options",
":=",
"&",
"policy",
".",
"OptionsType",
"{",
"CgroupName",
":",
"event",
".",
"PUID",
",",
"CgroupMark",
":",
"strconv",
".",
"FormatUint",
"(",
"cgnetcls",
".",
"MarkVal",
"(",
")",
",",
"10",
")",
",",
"Services",
":",
"event",
".",
"Services",
",",
"}",
"\n\n",
"runtimeIps",
":=",
"policy",
".",
"ExtendedMap",
"{",
"\"",
"\"",
":",
"\"",
"\"",
"}",
"\n\n",
"return",
"policy",
".",
"NewPURuntime",
"(",
"event",
".",
"Name",
",",
"int",
"(",
"event",
".",
"PID",
")",
",",
"\"",
"\"",
",",
"runtimeTags",
",",
"runtimeIps",
",",
"event",
".",
"PUType",
",",
"options",
")",
",",
"nil",
"\n",
"}"
] | // DefaultHostMetadataExtractor is a host specific metadata extractor | [
"DefaultHostMetadataExtractor",
"is",
"a",
"host",
"specific",
"metadata",
"extractor"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/extractors/linux.go#L28-L49 |
7,081 | aporeto-inc/trireme-lib | monitor/extractors/linux.go | ProcessInfo | func ProcessInfo(pid int32) []string {
userdata := []string{}
p, err := process.NewProcess(pid)
if err != nil {
return userdata
}
uids, err := p.Uids()
if err != nil {
return userdata
}
groups, err := p.Gids()
if err != nil {
return userdata
}
username, err := p.Username()
if err != nil {
return userdata
}
for _, uid := range uids {
userdata = append(userdata, "uid:"+strconv.Itoa(int(uid)))
}
for _, gid := range groups {
userdata = append(userdata, "gid:"+strconv.Itoa(int(gid)))
}
userdata = append(userdata, "username:"+username)
userid, err := user.Lookup(username)
if err != nil {
return userdata
}
gids, err := userid.GroupIds()
if err != nil {
return userdata
}
for i := 0; i < len(gids); i++ {
userdata = append(userdata, "gids:"+gids[i])
group, err := user.LookupGroupId(gids[i])
if err != nil {
continue
}
userdata = append(userdata, "groups:"+group.Name)
}
return userdata
} | go | func ProcessInfo(pid int32) []string {
userdata := []string{}
p, err := process.NewProcess(pid)
if err != nil {
return userdata
}
uids, err := p.Uids()
if err != nil {
return userdata
}
groups, err := p.Gids()
if err != nil {
return userdata
}
username, err := p.Username()
if err != nil {
return userdata
}
for _, uid := range uids {
userdata = append(userdata, "uid:"+strconv.Itoa(int(uid)))
}
for _, gid := range groups {
userdata = append(userdata, "gid:"+strconv.Itoa(int(gid)))
}
userdata = append(userdata, "username:"+username)
userid, err := user.Lookup(username)
if err != nil {
return userdata
}
gids, err := userid.GroupIds()
if err != nil {
return userdata
}
for i := 0; i < len(gids); i++ {
userdata = append(userdata, "gids:"+gids[i])
group, err := user.LookupGroupId(gids[i])
if err != nil {
continue
}
userdata = append(userdata, "groups:"+group.Name)
}
return userdata
} | [
"func",
"ProcessInfo",
"(",
"pid",
"int32",
")",
"[",
"]",
"string",
"{",
"userdata",
":=",
"[",
"]",
"string",
"{",
"}",
"\n\n",
"p",
",",
"err",
":=",
"process",
".",
"NewProcess",
"(",
"pid",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"userdata",
"\n",
"}",
"\n\n",
"uids",
",",
"err",
":=",
"p",
".",
"Uids",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"userdata",
"\n",
"}",
"\n\n",
"groups",
",",
"err",
":=",
"p",
".",
"Gids",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"userdata",
"\n",
"}",
"\n\n",
"username",
",",
"err",
":=",
"p",
".",
"Username",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"userdata",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"uid",
":=",
"range",
"uids",
"{",
"userdata",
"=",
"append",
"(",
"userdata",
",",
"\"",
"\"",
"+",
"strconv",
".",
"Itoa",
"(",
"int",
"(",
"uid",
")",
")",
")",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"gid",
":=",
"range",
"groups",
"{",
"userdata",
"=",
"append",
"(",
"userdata",
",",
"\"",
"\"",
"+",
"strconv",
".",
"Itoa",
"(",
"int",
"(",
"gid",
")",
")",
")",
"\n",
"}",
"\n\n",
"userdata",
"=",
"append",
"(",
"userdata",
",",
"\"",
"\"",
"+",
"username",
")",
"\n\n",
"userid",
",",
"err",
":=",
"user",
".",
"Lookup",
"(",
"username",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"userdata",
"\n",
"}",
"\n\n",
"gids",
",",
"err",
":=",
"userid",
".",
"GroupIds",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"userdata",
"\n",
"}",
"\n\n",
"for",
"i",
":=",
"0",
";",
"i",
"<",
"len",
"(",
"gids",
")",
";",
"i",
"++",
"{",
"userdata",
"=",
"append",
"(",
"userdata",
",",
"\"",
"\"",
"+",
"gids",
"[",
"i",
"]",
")",
"\n",
"group",
",",
"err",
":=",
"user",
".",
"LookupGroupId",
"(",
"gids",
"[",
"i",
"]",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"continue",
"\n",
"}",
"\n",
"userdata",
"=",
"append",
"(",
"userdata",
",",
"\"",
"\"",
"+",
"group",
".",
"Name",
")",
"\n",
"}",
"\n\n",
"return",
"userdata",
"\n",
"}"
] | // ProcessInfo returns all metadata captured by a process | [
"ProcessInfo",
"returns",
"all",
"metadata",
"captured",
"by",
"a",
"process"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/extractors/linux.go#L108-L161 |
7,082 | aporeto-inc/trireme-lib | monitor/extractors/linux.go | libs | func libs(binpath string) []string {
f, err := elf.Open(binpath)
if err != nil {
return []string{}
}
libraries, _ := f.ImportedLibraries()
return libraries
} | go | func libs(binpath string) []string {
f, err := elf.Open(binpath)
if err != nil {
return []string{}
}
libraries, _ := f.ImportedLibraries()
return libraries
} | [
"func",
"libs",
"(",
"binpath",
"string",
")",
"[",
"]",
"string",
"{",
"f",
",",
"err",
":=",
"elf",
".",
"Open",
"(",
"binpath",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"[",
"]",
"string",
"{",
"}",
"\n",
"}",
"\n",
"libraries",
",",
"_",
":=",
"f",
".",
"ImportedLibraries",
"(",
")",
"\n",
"return",
"libraries",
"\n",
"}"
] | // libs returns the list of dynamic library dependencies of an executable | [
"libs",
"returns",
"the",
"list",
"of",
"dynamic",
"library",
"dependencies",
"of",
"an",
"executable"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/extractors/linux.go#L225-L232 |
7,083 | aporeto-inc/trireme-lib | monitor/extractors/linux.go | IsHostPU | func IsHostPU(runtime policy.RuntimeReader, mode constants.ModeType) bool {
if runtime == nil {
return false
}
if mode != constants.LocalServer {
return false
}
return runtime.PUType() == common.HostPU
} | go | func IsHostPU(runtime policy.RuntimeReader, mode constants.ModeType) bool {
if runtime == nil {
return false
}
if mode != constants.LocalServer {
return false
}
return runtime.PUType() == common.HostPU
} | [
"func",
"IsHostPU",
"(",
"runtime",
"policy",
".",
"RuntimeReader",
",",
"mode",
"constants",
".",
"ModeType",
")",
"bool",
"{",
"if",
"runtime",
"==",
"nil",
"{",
"return",
"false",
"\n",
"}",
"\n\n",
"if",
"mode",
"!=",
"constants",
".",
"LocalServer",
"{",
"return",
"false",
"\n",
"}",
"\n\n",
"return",
"runtime",
".",
"PUType",
"(",
")",
"==",
"common",
".",
"HostPU",
"\n",
"}"
] | // IsHostPU returns true if puType stored by policy extensions is host PU | [
"IsHostPU",
"returns",
"true",
"if",
"puType",
"stored",
"by",
"policy",
"extensions",
"is",
"host",
"PU"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/monitor/extractors/linux.go#L266-L277 |
7,084 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/applicationproxy.go | NewAppProxy | func NewAppProxy(tp tokenaccessor.TokenAccessor, c collector.EventCollector, puFromID cache.DataStore, certificate *tls.Certificate, s secrets.Secrets) (*AppProxy, error) {
systemPool, err := x509.SystemCertPool()
if err != nil {
return nil, err
}
if ok := systemPool.AppendCertsFromPEM(s.PublicSecrets().CertAuthority()); !ok {
return nil, fmt.Errorf("error while adding provided CA")
}
return &AppProxy{
collector: c,
tokenaccessor: tp,
secrets: s,
puFromID: puFromID,
cert: certificate,
clients: cache.NewCache("clients"),
systemCAPool: systemPool,
registry: serviceregistry.NewServiceRegistry(),
}, nil
} | go | func NewAppProxy(tp tokenaccessor.TokenAccessor, c collector.EventCollector, puFromID cache.DataStore, certificate *tls.Certificate, s secrets.Secrets) (*AppProxy, error) {
systemPool, err := x509.SystemCertPool()
if err != nil {
return nil, err
}
if ok := systemPool.AppendCertsFromPEM(s.PublicSecrets().CertAuthority()); !ok {
return nil, fmt.Errorf("error while adding provided CA")
}
return &AppProxy{
collector: c,
tokenaccessor: tp,
secrets: s,
puFromID: puFromID,
cert: certificate,
clients: cache.NewCache("clients"),
systemCAPool: systemPool,
registry: serviceregistry.NewServiceRegistry(),
}, nil
} | [
"func",
"NewAppProxy",
"(",
"tp",
"tokenaccessor",
".",
"TokenAccessor",
",",
"c",
"collector",
".",
"EventCollector",
",",
"puFromID",
"cache",
".",
"DataStore",
",",
"certificate",
"*",
"tls",
".",
"Certificate",
",",
"s",
"secrets",
".",
"Secrets",
")",
"(",
"*",
"AppProxy",
",",
"error",
")",
"{",
"systemPool",
",",
"err",
":=",
"x509",
".",
"SystemCertPool",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"if",
"ok",
":=",
"systemPool",
".",
"AppendCertsFromPEM",
"(",
"s",
".",
"PublicSecrets",
"(",
")",
".",
"CertAuthority",
"(",
")",
")",
";",
"!",
"ok",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"&",
"AppProxy",
"{",
"collector",
":",
"c",
",",
"tokenaccessor",
":",
"tp",
",",
"secrets",
":",
"s",
",",
"puFromID",
":",
"puFromID",
",",
"cert",
":",
"certificate",
",",
"clients",
":",
"cache",
".",
"NewCache",
"(",
"\"",
"\"",
")",
",",
"systemCAPool",
":",
"systemPool",
",",
"registry",
":",
"serviceregistry",
".",
"NewServiceRegistry",
"(",
")",
",",
"}",
",",
"nil",
"\n",
"}"
] | // NewAppProxy creates a new instance of the application proxy. | [
"NewAppProxy",
"creates",
"a",
"new",
"instance",
"of",
"the",
"application",
"proxy",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/applicationproxy.go#L61-L82 |
7,085 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/applicationproxy.go | Unenforce | func (p *AppProxy) Unenforce(ctx context.Context, puID string) error {
p.Lock()
defer p.Unlock()
// Remove pu from registry
if err := p.registry.Unregister(puID); err != nil {
return err
}
// Find the correct client.
c, err := p.clients.Get(puID)
if err != nil {
return fmt.Errorf("Unable to find client")
}
client := c.(*clientData)
// Shutdown all the servers and unregister listeners.
for t, server := range client.netserver {
if err := client.protomux.UnregisterListener(t); err != nil {
zap.L().Error("Unable to unregister client", zap.Int("type", int(t)), zap.Error(err))
}
if err := server.ShutDown(); err != nil {
zap.L().Debug("Unable to shutdown client server", zap.Error(err))
}
}
// Terminate the connection multiplexer.
client.protomux.Close()
// Remove the client from the cache.
return p.clients.Remove(puID)
} | go | func (p *AppProxy) Unenforce(ctx context.Context, puID string) error {
p.Lock()
defer p.Unlock()
// Remove pu from registry
if err := p.registry.Unregister(puID); err != nil {
return err
}
// Find the correct client.
c, err := p.clients.Get(puID)
if err != nil {
return fmt.Errorf("Unable to find client")
}
client := c.(*clientData)
// Shutdown all the servers and unregister listeners.
for t, server := range client.netserver {
if err := client.protomux.UnregisterListener(t); err != nil {
zap.L().Error("Unable to unregister client", zap.Int("type", int(t)), zap.Error(err))
}
if err := server.ShutDown(); err != nil {
zap.L().Debug("Unable to shutdown client server", zap.Error(err))
}
}
// Terminate the connection multiplexer.
client.protomux.Close()
// Remove the client from the cache.
return p.clients.Remove(puID)
} | [
"func",
"(",
"p",
"*",
"AppProxy",
")",
"Unenforce",
"(",
"ctx",
"context",
".",
"Context",
",",
"puID",
"string",
")",
"error",
"{",
"p",
".",
"Lock",
"(",
")",
"\n",
"defer",
"p",
".",
"Unlock",
"(",
")",
"\n\n",
"// Remove pu from registry",
"if",
"err",
":=",
"p",
".",
"registry",
".",
"Unregister",
"(",
"puID",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"// Find the correct client.",
"c",
",",
"err",
":=",
"p",
".",
"clients",
".",
"Get",
"(",
"puID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"client",
":=",
"c",
".",
"(",
"*",
"clientData",
")",
"\n\n",
"// Shutdown all the servers and unregister listeners.",
"for",
"t",
",",
"server",
":=",
"range",
"client",
".",
"netserver",
"{",
"if",
"err",
":=",
"client",
".",
"protomux",
".",
"UnregisterListener",
"(",
"t",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Error",
"(",
"\"",
"\"",
",",
"zap",
".",
"Int",
"(",
"\"",
"\"",
",",
"int",
"(",
"t",
")",
")",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n",
"if",
"err",
":=",
"server",
".",
"ShutDown",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Debug",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"// Terminate the connection multiplexer.",
"client",
".",
"protomux",
".",
"Close",
"(",
")",
"\n\n",
"// Remove the client from the cache.",
"return",
"p",
".",
"clients",
".",
"Remove",
"(",
"puID",
")",
"\n",
"}"
] | // Unenforce implements enforcer.Enforcer interface. It will shutdown the app side
// of the proxy. | [
"Unenforce",
"implements",
"enforcer",
".",
"Enforcer",
"interface",
".",
"It",
"will",
"shutdown",
"the",
"app",
"side",
"of",
"the",
"proxy",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/applicationproxy.go#L191-L222 |
7,086 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/applicationproxy.go | UpdateSecrets | func (p *AppProxy) UpdateSecrets(secret secrets.Secrets) error {
p.Lock()
defer p.Unlock()
p.secrets = secret
return nil
} | go | func (p *AppProxy) UpdateSecrets(secret secrets.Secrets) error {
p.Lock()
defer p.Unlock()
p.secrets = secret
return nil
} | [
"func",
"(",
"p",
"*",
"AppProxy",
")",
"UpdateSecrets",
"(",
"secret",
"secrets",
".",
"Secrets",
")",
"error",
"{",
"p",
".",
"Lock",
"(",
")",
"\n",
"defer",
"p",
".",
"Unlock",
"(",
")",
"\n",
"p",
".",
"secrets",
"=",
"secret",
"\n",
"return",
"nil",
"\n",
"}"
] | // UpdateSecrets updates the secrets of running enforcers managed by trireme. Remote enforcers will
// get the secret updates with the next policy push. | [
"UpdateSecrets",
"updates",
"the",
"secrets",
"of",
"running",
"enforcers",
"managed",
"by",
"trireme",
".",
"Remote",
"enforcers",
"will",
"get",
"the",
"secret",
"updates",
"with",
"the",
"next",
"policy",
"push",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/applicationproxy.go#L231-L236 |
7,087 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/applicationproxy.go | registerAndRun | func (p *AppProxy) registerAndRun(ctx context.Context, puID string, ltype common.ListenerType, mux *protomux.MultiplexedListener, caPool *x509.CertPool, appproxy bool) (ServerInterface, error) {
var listener net.Listener
var err error
// Create a new sub-ordinate listerner and register it for the requested type.
listener, err = mux.RegisterListener(ltype)
if err != nil {
return nil, fmt.Errorf("Cannot register listener: %s", err)
}
// If the protocol is encrypted, wrapp it with TLS.
encrypted := false
if ltype == common.HTTPSNetwork {
encrypted = true
}
// Start the corresponding proxy
switch ltype {
case common.HTTPApplication, common.HTTPSApplication, common.HTTPNetwork, common.HTTPSNetwork:
c := httpproxy.NewHTTPProxy(p.collector, puID, caPool, appproxy, proxyMarkInt, p.secrets, p.registry)
return c, c.RunNetworkServer(ctx, listener, encrypted)
default:
c := tcp.NewTCPProxy(p.tokenaccessor, p.collector, puID, p.registry, p.cert, caPool)
return c, c.RunNetworkServer(ctx, listener, encrypted)
}
} | go | func (p *AppProxy) registerAndRun(ctx context.Context, puID string, ltype common.ListenerType, mux *protomux.MultiplexedListener, caPool *x509.CertPool, appproxy bool) (ServerInterface, error) {
var listener net.Listener
var err error
// Create a new sub-ordinate listerner and register it for the requested type.
listener, err = mux.RegisterListener(ltype)
if err != nil {
return nil, fmt.Errorf("Cannot register listener: %s", err)
}
// If the protocol is encrypted, wrapp it with TLS.
encrypted := false
if ltype == common.HTTPSNetwork {
encrypted = true
}
// Start the corresponding proxy
switch ltype {
case common.HTTPApplication, common.HTTPSApplication, common.HTTPNetwork, common.HTTPSNetwork:
c := httpproxy.NewHTTPProxy(p.collector, puID, caPool, appproxy, proxyMarkInt, p.secrets, p.registry)
return c, c.RunNetworkServer(ctx, listener, encrypted)
default:
c := tcp.NewTCPProxy(p.tokenaccessor, p.collector, puID, p.registry, p.cert, caPool)
return c, c.RunNetworkServer(ctx, listener, encrypted)
}
} | [
"func",
"(",
"p",
"*",
"AppProxy",
")",
"registerAndRun",
"(",
"ctx",
"context",
".",
"Context",
",",
"puID",
"string",
",",
"ltype",
"common",
".",
"ListenerType",
",",
"mux",
"*",
"protomux",
".",
"MultiplexedListener",
",",
"caPool",
"*",
"x509",
".",
"CertPool",
",",
"appproxy",
"bool",
")",
"(",
"ServerInterface",
",",
"error",
")",
"{",
"var",
"listener",
"net",
".",
"Listener",
"\n",
"var",
"err",
"error",
"\n\n",
"// Create a new sub-ordinate listerner and register it for the requested type.",
"listener",
",",
"err",
"=",
"mux",
".",
"RegisterListener",
"(",
"ltype",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"// If the protocol is encrypted, wrapp it with TLS.",
"encrypted",
":=",
"false",
"\n",
"if",
"ltype",
"==",
"common",
".",
"HTTPSNetwork",
"{",
"encrypted",
"=",
"true",
"\n",
"}",
"\n\n",
"// Start the corresponding proxy",
"switch",
"ltype",
"{",
"case",
"common",
".",
"HTTPApplication",
",",
"common",
".",
"HTTPSApplication",
",",
"common",
".",
"HTTPNetwork",
",",
"common",
".",
"HTTPSNetwork",
":",
"c",
":=",
"httpproxy",
".",
"NewHTTPProxy",
"(",
"p",
".",
"collector",
",",
"puID",
",",
"caPool",
",",
"appproxy",
",",
"proxyMarkInt",
",",
"p",
".",
"secrets",
",",
"p",
".",
"registry",
")",
"\n",
"return",
"c",
",",
"c",
".",
"RunNetworkServer",
"(",
"ctx",
",",
"listener",
",",
"encrypted",
")",
"\n",
"default",
":",
"c",
":=",
"tcp",
".",
"NewTCPProxy",
"(",
"p",
".",
"tokenaccessor",
",",
"p",
".",
"collector",
",",
"puID",
",",
"p",
".",
"registry",
",",
"p",
".",
"cert",
",",
"caPool",
")",
"\n",
"return",
"c",
",",
"c",
".",
"RunNetworkServer",
"(",
"ctx",
",",
"listener",
",",
"encrypted",
")",
"\n",
"}",
"\n",
"}"
] | // registerAndRun registers a new listener of the given type and runs the corresponding server | [
"registerAndRun",
"registers",
"a",
"new",
"listener",
"of",
"the",
"given",
"type",
"and",
"runs",
"the",
"corresponding",
"server"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/applicationproxy.go#L239-L264 |
7,088 | aporeto-inc/trireme-lib | controller/internal/enforcer/applicationproxy/applicationproxy.go | processCertificateUpdates | func (p *AppProxy) processCertificateUpdates(puInfo *policy.PUInfo, client *clientData, caPool *x509.CertPool) (bool, error) {
// If there are certificates provided, we will need to update them for the
// services. If the certificates are nil, we ignore them.
certPEM, keyPEM, caPEM := puInfo.Policy.ServiceCertificates()
if certPEM == "" || keyPEM == "" {
return false, nil
}
// Process any updates on the cert pool
if caPEM != "" {
if !caPool.AppendCertsFromPEM([]byte(caPEM)) {
zap.L().Warn("Failed to add Services CA")
}
}
// Create the TLS certificate
tlsCert, err := tls.X509KeyPair([]byte(certPEM), []byte(keyPEM))
if err != nil {
return false, fmt.Errorf("Invalid certificates: %s", err)
}
for _, server := range client.netserver {
server.UpdateSecrets(&tlsCert, caPool, p.secrets, certPEM, keyPEM)
}
return true, nil
} | go | func (p *AppProxy) processCertificateUpdates(puInfo *policy.PUInfo, client *clientData, caPool *x509.CertPool) (bool, error) {
// If there are certificates provided, we will need to update them for the
// services. If the certificates are nil, we ignore them.
certPEM, keyPEM, caPEM := puInfo.Policy.ServiceCertificates()
if certPEM == "" || keyPEM == "" {
return false, nil
}
// Process any updates on the cert pool
if caPEM != "" {
if !caPool.AppendCertsFromPEM([]byte(caPEM)) {
zap.L().Warn("Failed to add Services CA")
}
}
// Create the TLS certificate
tlsCert, err := tls.X509KeyPair([]byte(certPEM), []byte(keyPEM))
if err != nil {
return false, fmt.Errorf("Invalid certificates: %s", err)
}
for _, server := range client.netserver {
server.UpdateSecrets(&tlsCert, caPool, p.secrets, certPEM, keyPEM)
}
return true, nil
} | [
"func",
"(",
"p",
"*",
"AppProxy",
")",
"processCertificateUpdates",
"(",
"puInfo",
"*",
"policy",
".",
"PUInfo",
",",
"client",
"*",
"clientData",
",",
"caPool",
"*",
"x509",
".",
"CertPool",
")",
"(",
"bool",
",",
"error",
")",
"{",
"// If there are certificates provided, we will need to update them for the",
"// services. If the certificates are nil, we ignore them.",
"certPEM",
",",
"keyPEM",
",",
"caPEM",
":=",
"puInfo",
".",
"Policy",
".",
"ServiceCertificates",
"(",
")",
"\n",
"if",
"certPEM",
"==",
"\"",
"\"",
"||",
"keyPEM",
"==",
"\"",
"\"",
"{",
"return",
"false",
",",
"nil",
"\n",
"}",
"\n\n",
"// Process any updates on the cert pool",
"if",
"caPEM",
"!=",
"\"",
"\"",
"{",
"if",
"!",
"caPool",
".",
"AppendCertsFromPEM",
"(",
"[",
"]",
"byte",
"(",
"caPEM",
")",
")",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Warn",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"// Create the TLS certificate",
"tlsCert",
",",
"err",
":=",
"tls",
".",
"X509KeyPair",
"(",
"[",
"]",
"byte",
"(",
"certPEM",
")",
",",
"[",
"]",
"byte",
"(",
"keyPEM",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"server",
":=",
"range",
"client",
".",
"netserver",
"{",
"server",
".",
"UpdateSecrets",
"(",
"&",
"tlsCert",
",",
"caPool",
",",
"p",
".",
"secrets",
",",
"certPEM",
",",
"keyPEM",
")",
"\n",
"}",
"\n",
"return",
"true",
",",
"nil",
"\n",
"}"
] | // processCertificateUpdates processes the certificate information and updates
// the servers. | [
"processCertificateUpdates",
"processes",
"the",
"certificate",
"information",
"and",
"updates",
"the",
"servers",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/applicationproxy/applicationproxy.go#L273-L299 |
7,089 | aporeto-inc/trireme-lib | controller/internal/enforcer/nfqdatapath/nfq_linux.go | startNetworkInterceptor | func (d *Datapath) startNetworkInterceptor(ctx context.Context) {
var err error
nfq := make([]nfqueue.Verdict, d.filterQueue.GetNumNetworkQueues())
for i := uint16(0); i < d.filterQueue.GetNumNetworkQueues(); i++ {
// Initialize all the queues
nfq[i], err = nfqueue.CreateAndStartNfQueue(ctx, d.filterQueue.GetNetworkQueueStart()+i, d.filterQueue.GetNetworkQueueSize(), nfqueue.NfDefaultPacketSize, networkCallback, errorCallback, d)
if err != nil {
for retry := 0; retry < 5 && err != nil; retry++ {
nfq[i], err = nfqueue.CreateAndStartNfQueue(ctx, d.filterQueue.GetNetworkQueueStart()+i, d.filterQueue.GetNetworkQueueSize(), nfqueue.NfDefaultPacketSize, networkCallback, errorCallback, d)
<-time.After(3 * time.Second)
}
if err != nil {
zap.L().Fatal("Unable to initialize netfilter queue", zap.Error(err))
}
}
}
} | go | func (d *Datapath) startNetworkInterceptor(ctx context.Context) {
var err error
nfq := make([]nfqueue.Verdict, d.filterQueue.GetNumNetworkQueues())
for i := uint16(0); i < d.filterQueue.GetNumNetworkQueues(); i++ {
// Initialize all the queues
nfq[i], err = nfqueue.CreateAndStartNfQueue(ctx, d.filterQueue.GetNetworkQueueStart()+i, d.filterQueue.GetNetworkQueueSize(), nfqueue.NfDefaultPacketSize, networkCallback, errorCallback, d)
if err != nil {
for retry := 0; retry < 5 && err != nil; retry++ {
nfq[i], err = nfqueue.CreateAndStartNfQueue(ctx, d.filterQueue.GetNetworkQueueStart()+i, d.filterQueue.GetNetworkQueueSize(), nfqueue.NfDefaultPacketSize, networkCallback, errorCallback, d)
<-time.After(3 * time.Second)
}
if err != nil {
zap.L().Fatal("Unable to initialize netfilter queue", zap.Error(err))
}
}
}
} | [
"func",
"(",
"d",
"*",
"Datapath",
")",
"startNetworkInterceptor",
"(",
"ctx",
"context",
".",
"Context",
")",
"{",
"var",
"err",
"error",
"\n\n",
"nfq",
":=",
"make",
"(",
"[",
"]",
"nfqueue",
".",
"Verdict",
",",
"d",
".",
"filterQueue",
".",
"GetNumNetworkQueues",
"(",
")",
")",
"\n\n",
"for",
"i",
":=",
"uint16",
"(",
"0",
")",
";",
"i",
"<",
"d",
".",
"filterQueue",
".",
"GetNumNetworkQueues",
"(",
")",
";",
"i",
"++",
"{",
"// Initialize all the queues",
"nfq",
"[",
"i",
"]",
",",
"err",
"=",
"nfqueue",
".",
"CreateAndStartNfQueue",
"(",
"ctx",
",",
"d",
".",
"filterQueue",
".",
"GetNetworkQueueStart",
"(",
")",
"+",
"i",
",",
"d",
".",
"filterQueue",
".",
"GetNetworkQueueSize",
"(",
")",
",",
"nfqueue",
".",
"NfDefaultPacketSize",
",",
"networkCallback",
",",
"errorCallback",
",",
"d",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"for",
"retry",
":=",
"0",
";",
"retry",
"<",
"5",
"&&",
"err",
"!=",
"nil",
";",
"retry",
"++",
"{",
"nfq",
"[",
"i",
"]",
",",
"err",
"=",
"nfqueue",
".",
"CreateAndStartNfQueue",
"(",
"ctx",
",",
"d",
".",
"filterQueue",
".",
"GetNetworkQueueStart",
"(",
")",
"+",
"i",
",",
"d",
".",
"filterQueue",
".",
"GetNetworkQueueSize",
"(",
")",
",",
"nfqueue",
".",
"NfDefaultPacketSize",
",",
"networkCallback",
",",
"errorCallback",
",",
"d",
")",
"\n",
"<-",
"time",
".",
"After",
"(",
"3",
"*",
"time",
".",
"Second",
")",
"\n",
"}",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Fatal",
"(",
"\"",
"\"",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // startNetworkInterceptor will the process that processes packets from the network
// Still has one more copy than needed. Can be improved. | [
"startNetworkInterceptor",
"will",
"the",
"process",
"that",
"processes",
"packets",
"from",
"the",
"network",
"Still",
"has",
"one",
"more",
"copy",
"than",
"needed",
".",
"Can",
"be",
"improved",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/nfqdatapath/nfq_linux.go#L33-L51 |
7,090 | aporeto-inc/trireme-lib | controller/internal/enforcer/nfqdatapath/nfq_linux.go | startApplicationInterceptor | func (d *Datapath) startApplicationInterceptor(ctx context.Context) {
var err error
nfq := make([]nfqueue.Verdict, d.filterQueue.GetNumApplicationQueues())
for i := uint16(0); i < d.filterQueue.GetNumApplicationQueues(); i++ {
nfq[i], err = nfqueue.CreateAndStartNfQueue(ctx, d.filterQueue.GetApplicationQueueStart()+i, d.filterQueue.GetApplicationQueueSize(), nfqueue.NfDefaultPacketSize, appCallBack, errorCallback, d)
if err != nil {
for retry := 0; retry < 5 && err != nil; retry++ {
nfq[i], err = nfqueue.CreateAndStartNfQueue(ctx, d.filterQueue.GetApplicationQueueStart()+i, d.filterQueue.GetApplicationQueueSize(), nfqueue.NfDefaultPacketSize, appCallBack, errorCallback, d)
<-time.After(3 * time.Second)
}
if err != nil {
zap.L().Fatal("Unable to initialize netfilter queue", zap.Int("QueueNum", int(d.filterQueue.GetNetworkQueueStart()+i)), zap.Error(err))
}
}
}
} | go | func (d *Datapath) startApplicationInterceptor(ctx context.Context) {
var err error
nfq := make([]nfqueue.Verdict, d.filterQueue.GetNumApplicationQueues())
for i := uint16(0); i < d.filterQueue.GetNumApplicationQueues(); i++ {
nfq[i], err = nfqueue.CreateAndStartNfQueue(ctx, d.filterQueue.GetApplicationQueueStart()+i, d.filterQueue.GetApplicationQueueSize(), nfqueue.NfDefaultPacketSize, appCallBack, errorCallback, d)
if err != nil {
for retry := 0; retry < 5 && err != nil; retry++ {
nfq[i], err = nfqueue.CreateAndStartNfQueue(ctx, d.filterQueue.GetApplicationQueueStart()+i, d.filterQueue.GetApplicationQueueSize(), nfqueue.NfDefaultPacketSize, appCallBack, errorCallback, d)
<-time.After(3 * time.Second)
}
if err != nil {
zap.L().Fatal("Unable to initialize netfilter queue", zap.Int("QueueNum", int(d.filterQueue.GetNetworkQueueStart()+i)), zap.Error(err))
}
}
}
} | [
"func",
"(",
"d",
"*",
"Datapath",
")",
"startApplicationInterceptor",
"(",
"ctx",
"context",
".",
"Context",
")",
"{",
"var",
"err",
"error",
"\n\n",
"nfq",
":=",
"make",
"(",
"[",
"]",
"nfqueue",
".",
"Verdict",
",",
"d",
".",
"filterQueue",
".",
"GetNumApplicationQueues",
"(",
")",
")",
"\n\n",
"for",
"i",
":=",
"uint16",
"(",
"0",
")",
";",
"i",
"<",
"d",
".",
"filterQueue",
".",
"GetNumApplicationQueues",
"(",
")",
";",
"i",
"++",
"{",
"nfq",
"[",
"i",
"]",
",",
"err",
"=",
"nfqueue",
".",
"CreateAndStartNfQueue",
"(",
"ctx",
",",
"d",
".",
"filterQueue",
".",
"GetApplicationQueueStart",
"(",
")",
"+",
"i",
",",
"d",
".",
"filterQueue",
".",
"GetApplicationQueueSize",
"(",
")",
",",
"nfqueue",
".",
"NfDefaultPacketSize",
",",
"appCallBack",
",",
"errorCallback",
",",
"d",
")",
"\n\n",
"if",
"err",
"!=",
"nil",
"{",
"for",
"retry",
":=",
"0",
";",
"retry",
"<",
"5",
"&&",
"err",
"!=",
"nil",
";",
"retry",
"++",
"{",
"nfq",
"[",
"i",
"]",
",",
"err",
"=",
"nfqueue",
".",
"CreateAndStartNfQueue",
"(",
"ctx",
",",
"d",
".",
"filterQueue",
".",
"GetApplicationQueueStart",
"(",
")",
"+",
"i",
",",
"d",
".",
"filterQueue",
".",
"GetApplicationQueueSize",
"(",
")",
",",
"nfqueue",
".",
"NfDefaultPacketSize",
",",
"appCallBack",
",",
"errorCallback",
",",
"d",
")",
"\n",
"<-",
"time",
".",
"After",
"(",
"3",
"*",
"time",
".",
"Second",
")",
"\n",
"}",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"zap",
".",
"L",
"(",
")",
".",
"Fatal",
"(",
"\"",
"\"",
",",
"zap",
".",
"Int",
"(",
"\"",
"\"",
",",
"int",
"(",
"d",
".",
"filterQueue",
".",
"GetNetworkQueueStart",
"(",
")",
"+",
"i",
")",
")",
",",
"zap",
".",
"Error",
"(",
"err",
")",
")",
"\n",
"}",
"\n\n",
"}",
"\n",
"}",
"\n",
"}"
] | // startApplicationInterceptor will create a interceptor that processes
// packets originated from a local application | [
"startApplicationInterceptor",
"will",
"create",
"a",
"interceptor",
"that",
"processes",
"packets",
"originated",
"from",
"a",
"local",
"application"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/controller/internal/enforcer/nfqdatapath/nfq_linux.go#L55-L74 |
7,091 | aporeto-inc/trireme-lib | policy/runtime.go | NewPURuntime | func NewPURuntime(name string, pid int, nsPath string, tags *TagStore, ips ExtendedMap, puType common.PUType, options *OptionsType) *PURuntime {
if tags == nil {
tags = NewTagStore()
}
if ips == nil {
ips = ExtendedMap{}
}
if options == nil {
options = &OptionsType{}
}
return &PURuntime{
puType: puType,
tags: tags,
ips: ips,
options: options,
pid: pid,
nsPath: nsPath,
name: name,
}
} | go | func NewPURuntime(name string, pid int, nsPath string, tags *TagStore, ips ExtendedMap, puType common.PUType, options *OptionsType) *PURuntime {
if tags == nil {
tags = NewTagStore()
}
if ips == nil {
ips = ExtendedMap{}
}
if options == nil {
options = &OptionsType{}
}
return &PURuntime{
puType: puType,
tags: tags,
ips: ips,
options: options,
pid: pid,
nsPath: nsPath,
name: name,
}
} | [
"func",
"NewPURuntime",
"(",
"name",
"string",
",",
"pid",
"int",
",",
"nsPath",
"string",
",",
"tags",
"*",
"TagStore",
",",
"ips",
"ExtendedMap",
",",
"puType",
"common",
".",
"PUType",
",",
"options",
"*",
"OptionsType",
")",
"*",
"PURuntime",
"{",
"if",
"tags",
"==",
"nil",
"{",
"tags",
"=",
"NewTagStore",
"(",
")",
"\n",
"}",
"\n\n",
"if",
"ips",
"==",
"nil",
"{",
"ips",
"=",
"ExtendedMap",
"{",
"}",
"\n",
"}",
"\n\n",
"if",
"options",
"==",
"nil",
"{",
"options",
"=",
"&",
"OptionsType",
"{",
"}",
"\n",
"}",
"\n\n",
"return",
"&",
"PURuntime",
"{",
"puType",
":",
"puType",
",",
"tags",
":",
"tags",
",",
"ips",
":",
"ips",
",",
"options",
":",
"options",
",",
"pid",
":",
"pid",
",",
"nsPath",
":",
"nsPath",
",",
"name",
":",
"name",
",",
"}",
"\n",
"}"
] | // NewPURuntime Generate a new RuntimeInfo | [
"NewPURuntime",
"Generate",
"a",
"new",
"RuntimeInfo"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/runtime.go#L50-L73 |
7,092 | aporeto-inc/trireme-lib | policy/runtime.go | MarshalJSON | func (r *PURuntime) MarshalJSON() ([]byte, error) {
return json.Marshal(&PURuntimeJSON{
PUType: r.puType,
Pid: r.pid,
NSPath: r.nsPath,
Name: r.name,
IPAddresses: r.ips,
Tags: r.tags,
Options: r.options,
})
} | go | func (r *PURuntime) MarshalJSON() ([]byte, error) {
return json.Marshal(&PURuntimeJSON{
PUType: r.puType,
Pid: r.pid,
NSPath: r.nsPath,
Name: r.name,
IPAddresses: r.ips,
Tags: r.tags,
Options: r.options,
})
} | [
"func",
"(",
"r",
"*",
"PURuntime",
")",
"MarshalJSON",
"(",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"return",
"json",
".",
"Marshal",
"(",
"&",
"PURuntimeJSON",
"{",
"PUType",
":",
"r",
".",
"puType",
",",
"Pid",
":",
"r",
".",
"pid",
",",
"NSPath",
":",
"r",
".",
"nsPath",
",",
"Name",
":",
"r",
".",
"name",
",",
"IPAddresses",
":",
"r",
".",
"ips",
",",
"Tags",
":",
"r",
".",
"tags",
",",
"Options",
":",
"r",
".",
"options",
",",
"}",
")",
"\n",
"}"
] | // MarshalJSON Marshals this struct. | [
"MarshalJSON",
"Marshals",
"this",
"struct",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/runtime.go#L90-L100 |
7,093 | aporeto-inc/trireme-lib | policy/runtime.go | UnmarshalJSON | func (r *PURuntime) UnmarshalJSON(param []byte) error {
a := &PURuntimeJSON{}
if err := json.Unmarshal(param, &a); err != nil {
return err
}
r.pid = a.Pid
r.nsPath = a.NSPath
r.name = a.Name
r.ips = a.IPAddresses
r.tags = a.Tags
r.options = a.Options
r.puType = a.PUType
return nil
} | go | func (r *PURuntime) UnmarshalJSON(param []byte) error {
a := &PURuntimeJSON{}
if err := json.Unmarshal(param, &a); err != nil {
return err
}
r.pid = a.Pid
r.nsPath = a.NSPath
r.name = a.Name
r.ips = a.IPAddresses
r.tags = a.Tags
r.options = a.Options
r.puType = a.PUType
return nil
} | [
"func",
"(",
"r",
"*",
"PURuntime",
")",
"UnmarshalJSON",
"(",
"param",
"[",
"]",
"byte",
")",
"error",
"{",
"a",
":=",
"&",
"PURuntimeJSON",
"{",
"}",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"param",
",",
"&",
"a",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"r",
".",
"pid",
"=",
"a",
".",
"Pid",
"\n",
"r",
".",
"nsPath",
"=",
"a",
".",
"NSPath",
"\n",
"r",
".",
"name",
"=",
"a",
".",
"Name",
"\n",
"r",
".",
"ips",
"=",
"a",
".",
"IPAddresses",
"\n",
"r",
".",
"tags",
"=",
"a",
".",
"Tags",
"\n",
"r",
".",
"options",
"=",
"a",
".",
"Options",
"\n",
"r",
".",
"puType",
"=",
"a",
".",
"PUType",
"\n",
"return",
"nil",
"\n",
"}"
] | // UnmarshalJSON Unmarshals this struct. | [
"UnmarshalJSON",
"Unmarshals",
"this",
"struct",
"."
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/runtime.go#L103-L116 |
7,094 | aporeto-inc/trireme-lib | policy/runtime.go | Pid | func (r *PURuntime) Pid() int {
r.Lock()
defer r.Unlock()
return r.pid
} | go | func (r *PURuntime) Pid() int {
r.Lock()
defer r.Unlock()
return r.pid
} | [
"func",
"(",
"r",
"*",
"PURuntime",
")",
"Pid",
"(",
")",
"int",
"{",
"r",
".",
"Lock",
"(",
")",
"\n",
"defer",
"r",
".",
"Unlock",
"(",
")",
"\n\n",
"return",
"r",
".",
"pid",
"\n",
"}"
] | // Pid returns the PID | [
"Pid",
"returns",
"the",
"PID"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/runtime.go#L119-L124 |
7,095 | aporeto-inc/trireme-lib | policy/runtime.go | SetPid | func (r *PURuntime) SetPid(pid int) {
r.Lock()
defer r.Unlock()
r.pid = pid
} | go | func (r *PURuntime) SetPid(pid int) {
r.Lock()
defer r.Unlock()
r.pid = pid
} | [
"func",
"(",
"r",
"*",
"PURuntime",
")",
"SetPid",
"(",
"pid",
"int",
")",
"{",
"r",
".",
"Lock",
"(",
")",
"\n",
"defer",
"r",
".",
"Unlock",
"(",
")",
"\n\n",
"r",
".",
"pid",
"=",
"pid",
"\n",
"}"
] | // SetPid sets the PID | [
"SetPid",
"sets",
"the",
"PID"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/runtime.go#L127-L132 |
7,096 | aporeto-inc/trireme-lib | policy/runtime.go | NSPath | func (r *PURuntime) NSPath() string {
r.Lock()
defer r.Unlock()
return r.nsPath
} | go | func (r *PURuntime) NSPath() string {
r.Lock()
defer r.Unlock()
return r.nsPath
} | [
"func",
"(",
"r",
"*",
"PURuntime",
")",
"NSPath",
"(",
")",
"string",
"{",
"r",
".",
"Lock",
"(",
")",
"\n",
"defer",
"r",
".",
"Unlock",
"(",
")",
"\n\n",
"return",
"r",
".",
"nsPath",
"\n",
"}"
] | // NSPath returns the NSPath | [
"NSPath",
"returns",
"the",
"NSPath"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/runtime.go#L135-L140 |
7,097 | aporeto-inc/trireme-lib | policy/runtime.go | SetNSPath | func (r *PURuntime) SetNSPath(nsPath string) {
r.Lock()
defer r.Unlock()
r.nsPath = nsPath
} | go | func (r *PURuntime) SetNSPath(nsPath string) {
r.Lock()
defer r.Unlock()
r.nsPath = nsPath
} | [
"func",
"(",
"r",
"*",
"PURuntime",
")",
"SetNSPath",
"(",
"nsPath",
"string",
")",
"{",
"r",
".",
"Lock",
"(",
")",
"\n",
"defer",
"r",
".",
"Unlock",
"(",
")",
"\n\n",
"r",
".",
"nsPath",
"=",
"nsPath",
"\n",
"}"
] | // SetNSPath sets the NSPath | [
"SetNSPath",
"sets",
"the",
"NSPath"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/runtime.go#L143-L148 |
7,098 | aporeto-inc/trireme-lib | policy/runtime.go | SetOptions | func (r *PURuntime) SetOptions(options OptionsType) {
r.Lock()
defer r.Unlock()
r.options = &options
} | go | func (r *PURuntime) SetOptions(options OptionsType) {
r.Lock()
defer r.Unlock()
r.options = &options
} | [
"func",
"(",
"r",
"*",
"PURuntime",
")",
"SetOptions",
"(",
"options",
"OptionsType",
")",
"{",
"r",
".",
"Lock",
"(",
")",
"\n",
"defer",
"r",
".",
"Unlock",
"(",
")",
"\n\n",
"r",
".",
"options",
"=",
"&",
"options",
"\n",
"}"
] | // SetOptions sets the Options | [
"SetOptions",
"sets",
"the",
"Options"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/runtime.go#L159-L164 |
7,099 | aporeto-inc/trireme-lib | policy/runtime.go | Name | func (r *PURuntime) Name() string {
r.Lock()
defer r.Unlock()
return r.name
} | go | func (r *PURuntime) Name() string {
r.Lock()
defer r.Unlock()
return r.name
} | [
"func",
"(",
"r",
"*",
"PURuntime",
")",
"Name",
"(",
")",
"string",
"{",
"r",
".",
"Lock",
"(",
")",
"\n",
"defer",
"r",
".",
"Unlock",
"(",
")",
"\n\n",
"return",
"r",
".",
"name",
"\n",
"}"
] | // Name returns the PID | [
"Name",
"returns",
"the",
"PID"
] | 009258cf9b4f3f70f71994d9fadebe564f7e0437 | https://github.com/aporeto-inc/trireme-lib/blob/009258cf9b4f3f70f71994d9fadebe564f7e0437/policy/runtime.go#L167-L172 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.