https://github.com/cilium/cilium

sort by:
Revision Author Date Message Commit Date
abd683d daemon: fix k8s GetLabels if response is nil Backports a355c3b Signed-off-by: André Martins <andre@cilium.io> 18 April 2017, 11:48:57 UTC
0eb34e5 Vagrantfile: Point client binary to 0.8.2 release Signed-off-by: Thomas Graf <thomas@cilium.io> 14 April 2017, 14:23:08 UTC
33acff4 0.8.2 release Signed-off-by: Thomas Graf <thomas@cilium.io> 14 April 2017, 14:02:43 UTC
328c5b5 Vagrant: Simplified Vagrantfile to get started This new Vagrantfile is based on bento/ubuntu and uses the stock Linux kernel as provided by Ubuntu. It install a Docker runtime and then runs the Cilium agent and Cilium Docker plugin using the released container images. The client binary is installed natively for easy use. Backports: 6c6f4c7125a1dd3d82e0199a9307d61d9939b05d Signed-off-by: Thomas Graf <thomas@cilium.io> 14 April 2017, 13:45:57 UTC
18860fd Dockerfile: Add a group cilium This will cause the cilium.sock to be owned by group cilium Backports: 3d5043ca84beebdf2505f80761ed833e5ff55fff Signed-off-by: Thomas Graf <thomas@cilium.io> 14 April 2017, 09:28:18 UTC
229602b daemon: Always enable net.ipv6.conf.all.disable_ipv6=0 for now Docker <17.05 has an issue which causes IPv6 to be disabled in the initns for all interface (https://github.com/docker/libnetwork/issues/1720) Backports: 19e0ed1e8e5ba92d9732fcea6366d465e61ce50a Signed-off-by: Thomas Graf <thomas@cilium.io> 14 April 2017, 09:28:18 UTC
a6794ab policy: Fix policy Lookup() function A bug in the tree.Lookup() function caused path dependencies to not be correctly created. Fixes this bug and adds several additional unit tests to cover this better. Backports: 3697d305e3a055c6ff858086d197ca04a92b39f8 Signed-off-by: Thomas Graf <thomas@cilium.io> 14 April 2017, 09:28:18 UTC
c88a952 policy: Support carrying part of the path in the name Support adding policy construct like this: name: foo.bar path: root will add node "bar" to path "root.foo" Backports: bcaa09e580fd227ab2173608f654dd6fa3abea12 Signed-off-by: Thomas Graf <thomas@cilium.io> 12 April 2017, 09:10:26 UTC
84f9b81 tests: adding benchmark flag for 06-lb.sh benchmark tests Backports: 04b7f65fbbd0e56efc1428a437dac0fef38d6f4a Signed-off-by: André Martins <andre@cilium.io> 12 April 2017, 09:10:26 UTC
1d7e1f8 tests: enabling NAT46 config for 08-nat46.sh Backports: 1733621302d5798372ec4289e2ba537cfd0c7f4a Signed-off-by: André Martins <andre@cilium.io> 12 April 2017, 09:10:26 UTC
0ab8cda tests: removing `-t` docker flag from tests The use of `-t` was creating errors in jenkins tests with the message: "the input device is not a TTY". Thus, removing this unecessary flag solves the problem. Backports: bdd944a4af5d44a57bdd0c624dcd4aab680936bc Signed-off-by: André Martins <andre@cilium.io> 12 April 2017, 09:10:26 UTC
6816f37 tests: enforcing tag v0.5.2 for cni tests Backports: dec0aa284c9cc23547e225fb399beccfb1618528 Signed-off-by: André Martins <andre@cilium.io> 12 April 2017, 09:10:26 UTC
2dcafff tests: typo fix in 06-lb.sh Backports: 2c584b4f059b18f7be5e3dfc3466eb3200a50160 Signed-off-by: André Martins <andre@cilium.io> 12 April 2017, 09:10:26 UTC
9ac8f54 tests: set -e on run-tests to exit on failure Backports: c480a2edddc0c4c5fb3e614b8129ec77c3bc124b Signed-off-by: André Martins <andre@cilium.io> 12 April 2017, 09:10:26 UTC
fb3de40 tests: changed nettools docker image Backports: d79344b1b2af1c11d09bfc29f79c9d13d9346b08 Signed-off-by: André Martins <andre@cilium.io> 12 April 2017, 09:10:26 UTC
d73a70d daemon: Read bpf_features.log from state directory Also fixes 06-lb.sh to use correct state directory Fixes: 880f9cc41 ("daemon: Separate state directory inside runtime directory") Backports: 2b916c7dd512bd40985d17dcf9ea205aa00b0083 Signed-off-by: Thomas Graf <thomas@cilium.io> 12 April 2017, 09:10:26 UTC
3485679 daemon: Separate state directory inside runtime directory Moves all endpoint state into the state/ subdirectory inside the existing runtime directory. This allows to establish different permissions for the default runtime directory which can be mounted into container images and the actual state which must be protected. Allows moving cilium.sock back into the runtime directory for easy sharing in and out of containers. Backports: 880f9cc4159198206678ee628254f2e9579108ca Signed-off-by: Thomas Graf <thomas@cilium.io> 12 April 2017, 09:10:26 UTC
fda3c03 0.8.1 release Signed-off-by: Thomas Graf <thomas@cilium.io> 06 April 2017, 11:45:06 UTC
b3d4a76 Fix getting started guide by using the correct field names Reported-by: Raghu G <r.grizzly@gmail.com> Fixes: #511 Backports: #515 Backports: cc3f43447aac810786ed88e18dfd61be4e250d58 Signed-off-by: Thomas Graf <thomas@cilium.io> 05 April 2017, 17:16:43 UTC
7c419a6 Dockerfile: adding required libraries for checkers clang needs 2 more files, `ld` which is provided by binutils and `crtbegin.o` which is provided by libgcc-5-dev. Backports: #514 Backports: 1a7858247377701656c97027f94f688a552f91bd Signed-off-by: André Martins <andre@cilium.io> 05 April 2017, 17:16:43 UTC
24a854c L7 HTTP Policy does not work The commit for "proxy: Rename L7 fields in L4 policy" (sha: 30c0a6a6521fe0873fca26d07b50e342ba099f9a) updated the policy fields. The json field 'redirect' was updated to 'l7-parser'. The corresponding golang variable L7Parser was not being set causing the HTTP L7 policies, for example the specified on the Getting Started Guide, to not function properly. The fix simply sets the L7Parser variable correctly Backports: #512 Backports: 43fe31e0941067fbe5217ee39fb3a00352e8db99 Signed-off-by: Raghu G <r.grizzly@gmail.com> 05 April 2017, 17:16:43 UTC
860c20a proxy: Rename L7 fields in L4 policy golang: Redirect => L7Parser RedirectPort => L7RedirectPort Rules => L7Rules json: redirect => l7-parser redirect-port => l7-redirect-port rules => l7-rules Backports: #500 Backports: 30c0a6a6521fe0873fca26d07b50e342ba099f9a Signed-off-by: Thomas Graf <thomas@cilium.io> 05 April 2017, 17:16:43 UTC
6f5d0c7 daemon: Reduce logging metadata to improve readability Backports: #499 Signed-off-by: Thomas Graf <thomas@cilium.io> 05 April 2017, 05:40:27 UTC
f3004e2 cmd: file policy import bug fix While processing all files when importing from a directory, the policy was not properly imported to the daemon. This was due the incorrect assumption that a pointer's value could be assigned inside a function. By passing a pointer of the pointer's value, it is possible to assign a new value inside the function. Backports: #507 Signed-off-by: André Martins <andre@cilium.io> 04 April 2017, 19:45:43 UTC
9b9e138 release: 0.8.0 release \o/ Signed-off-by: Thomas Graf <thomas@cilium.io> 28 March 2017, 10:56:08 UTC
10cf878 doc: Intro improvements Signed-off-by: Thomas Graf <thomas@cilium.io> 28 March 2017, 10:25:16 UTC
b8b4c5e Doc: incorporate general feedback/fixes across all docs. Added table with cilium-agent command-line flags Note: many changes originally in this commit overlapped with feedback tgraf was addressing in 380214190092889653fd40f03015a0a5623a9427 . I believe I have resolved all of the resulting conflicts. Signed-off-by: Dan Wendlandt <danwent@gmail.com> 28 March 2017, 09:16:27 UTC
8cfe6ef bpf: Only reject IPv6 proxy redirects, not all L4 Fixes ba38a8849 ("bpf: Drop all IPv6 packets which are subject to proxy redirect") Signed-off-by: Thomas Graf <thomas@cilium.io> 27 March 2017, 23:07:10 UTC
9e716eb endpoint: Fix endpoint test Addition of status always being present broke the DeepCopy() test Signed-off-by: Thomas Graf <thomas@cilium.io> 27 March 2017, 22:43:07 UTC
ba38a88 bpf: Drop all IPv6 packets which are subject to proxy redirect IPv6 proxy redirection is not fully supported yet. Drop these packets to indicate that this is an unsupported feature. This is better than to bypass possible security rules which may be intentend to be applied to both IPv4 and IPv6. Signed-off-by: Thomas Graf <thomas@cilium.io> 27 March 2017, 22:04:14 UTC
629d62e daemon: Attach BPF program immediately after join The current model was to wait until the labels have been resolved and the identity has been derived before the BPF was generated and attached. This meant that the container was capable of sending a few packets into the empty veth pair which were routed by the Linux host. Instead, attach a BPF program immediately with the identity unresolved. The program will drop all packets because the policy has not been resolved yet. This is required to ensure we can drop initial connection attempts by the container and force retransmits which then go through the policy enforcement engine. Resolves long standing issue of connectivity issues when running: `docker run [...] curl [...]` Signed-off-by: Thomas Graf <thomas@cilium.io> 27 March 2017, 22:04:14 UTC
be5c051 rewrite of build-rpm make target Signed-off-by: Marcin Skarbek <git@skarbek.name> 27 March 2017, 21:53:45 UTC
e9100e1 doc: Remove "Cilium" prefix from main sections Signed-off-by: Thomas Graf <thomas@cilium.io> 27 March 2017, 20:57:41 UTC
3802141 doc: Various typo on style fixes Feedback provided by Romain Lenglet and Michi Mutsuzaki Signed-off-by: Thomas Graf <thomas@cilium.io> 27 March 2017, 20:57:41 UTC
c354dbf doc: Note that vagrant >= 1.8.3 is required Signed-off-by: Thomas Graf <thomas@cilium.io> 27 March 2017, 20:57:41 UTC
805ebac Doc: Fix-up the getting started guide Signed-off-by: Dan Wendlandt <danwent@gmail.com> 27 March 2017, 20:33:02 UTC
6be2cb1 bpf: Disable assembly debugging output by default This reduces the build time to generate programs Signed-off-by: Thomas Graf <thomas@cilium.io> 27 March 2017, 19:25:44 UTC
f9f2a07 policy: Drop all packets until policy has been calculated When a container is started there is a short time period until the policy has been calculated and applied, drop all ingress and egress packets in that time period to ensure we are not bypassing policy rules. Signed-off-by: Thomas Graf <thomas@cilium.io> 27 March 2017, 19:25:44 UTC
f2db293 bpf: Add DROP_ALL define to drop all traffic Signed-off-by: Thomas Graf <thomas@cilium.io> 27 March 2017, 19:25:44 UTC
e025484 Vagrantfile: bumping minimal vagrant version required Signed-off-by: André Martins <andre@cilium.io> 27 March 2017, 19:25:19 UTC
ab1e785 doc: Added requirements.txt to install sphinxcontrib-httpdomain Signed-off-by: Thomas Graf <thomas@cilium.io> 27 March 2017, 15:12:34 UTC
82e3136 Docs: initial work on architecture guide and admin guide. Signed-off-by: Dan Wendlandt <danwent@gmail.com> 27 March 2017, 15:02:13 UTC
8efbf1e bpf, tests: cleanup really all server1-5 containers On cleanup, we need to remove server1 to server5, not just server1 and server2. Signed-off-by: Daniel Borkmann <daniel@cilium.io> 26 March 2017, 21:29:07 UTC
b31931e bpf: Omit IPv4 policy enforcement if IPv4 is disabled Signed-off-by: Thomas Graf <thomas@cilium.io> 26 March 2017, 19:00:27 UTC
a86beb1 daemon: Do not run IPv4 CT if IPv4 is disabled Signed-off-by: Thomas Graf <thomas@cilium.io> 26 March 2017, 19:00:27 UTC
d6b1322 Use -nv when using wget to download stuff Spams the vagrant log like crazy Signed-off-by: Thomas Graf <thomas@cilium.io> 26 March 2017, 16:56:04 UTC
4b933e6 examples: Fix policy in kubernetes example Signed-off-by: Thomas Graf <thomas@cilium.io> 26 March 2017, 16:56:04 UTC
072a685 daemon: Disable NAT46 by default It adds complexity to the BPF programs, require user to enable this feature specifically. Signed-off-by: Thomas Graf <thomas@cilium.io> 26 March 2017, 16:47:01 UTC
34ad022 daemon: Only enable NAT46 if IPv4 has been enabled Current BPF programs require IPv4 to be enabled in order for NAT46 to be effective Signed-off-by: Thomas Graf <thomas@cilium.io> 26 March 2017, 16:47:01 UTC
c2091c5 bpf: Protect ipv4_redirect_to_host_port() with LXC_IPV4 The caller is protected by LXC_IPV4 as well. Fixes the following error: In file included from /var/lib/cilium/bpf/bpf_lxc.c:38: /var/lib/cilium/bpf/lib/lxc.h:93:29: error: use of undeclared identifier 'LXC_IPV4' .saddr = __constant_htonl(LXC_IPV4), Fixes: 770ad9ccb2de7cb ("proxy: Initial transparent proxy support") Signed-off-by: Thomas Graf <thomas@cilium.io> 26 March 2017, 16:47:01 UTC
bc255c3 Add version command and flag to tools cilium version cilium-agent --version Encodes version, git sha abbrev, git commit date, and go build version Fixes: #449 Signed-off-by: Thomas Graf <thomas@cilium.io> 26 March 2017, 16:35:17 UTC
53be5c4 daemon: Fix bindata.go Previous generated data included bpf/go/map_ctrl binary for some reason Signed-off-by: Thomas Graf <thomas@cilium.io> 26 March 2017, 13:59:07 UTC
9546bf0 doc: Do not include sphinx_rtd_theme as a submodule Signed-off-by: Thomas Graf <thomas@cilium.io> 26 March 2017, 09:58:46 UTC
1635c32 cilium: update go bindata after bpf changes After changing the BPF code, we need to rebuild the bindata once again. Signed-off-by: Daniel Borkmann <daniel@cilium.io> 26 March 2017, 00:59:02 UTC
90c9948 bpf: add probe and workaround for set_hash_invalid 4.8 kernel doesn't have set_hash_invalid(), so we need to add a probe plus workaround to use BPF_F_INVALIDATE_HASH via bpf_skb_store_bytes() instead. Lets not try to be clever for just 4.8 and add this to various other locations that eventually call this, as they are subject to future change and just make it harder to review. Keeping all in lb_enforce_rehash() is much simpler (despite ugly workaround). Signed-off-by: Daniel Borkmann <daniel@cilium.io> 26 March 2017, 00:59:02 UTC
2fe1e16 cilium: update go bindata after bpf changes After changing the BPF code, we need to rebuild the bindata of course so this gets shipped properly. Signed-off-by: Daniel Borkmann <daniel@cilium.io> 25 March 2017, 23:09:15 UTC
61b9316 bpf: really enforce rehashing of skb->hash The 06-lb test case was causing connection timeouts (at least for the IPv4 lb tests, but not for IPv6 it seems) and giving really poor IPv4 performance on httpd. pcap files showed heavy retransmissions after some point in time. From kernel side, allocation failures (f.e. from map element side) have not been observed, independent of hashtable or LRU. Then, replacing httpd with nginx gave same results as well as replacing various clients. wrk tests seemed to provide consistent results although ab tests not (issuing connection timeouts), so could be related to longer-living tcp connections. Also 01-ct test was running fine for IPv6/IPv4, so it must have been lb related. Next, reducing the number of backends to 1 in IPv4 made the test working again as well as having X,X>1 backends all pointing to the same server, so it must have been in the service selection, that scarcely the selection of backends was not consistent for a flow. Turned out that get_hash_recalc() was not used correctly in this context. The helper calls skb_get_hash() in the kernel and rehashes if we don't have an l4 hash or that l4 hash is not a sw hash. Given we mangle the packets in various paths, they still keep the stale original skb->hash around, but what we want is really to calculate the hash of the current packet state at the point where we are in lb{4,6}_select_slave(), so we can make a consistent lb decision. This at least fixes the timeouts on my side and makes v4/v6 results similar/consistent. Also, hash is really __u32 and not __be16 type. Signed-off-by: Daniel Borkmann <daniel@cilium.io> 25 March 2017, 23:09:15 UTC
41ab53f README: add Read the Docs link RtD let's you read the docs chapter by chapter. It also has some nice format offers for downloading. Having a badge makes it more visible. Signed-off-by: Alexander Alemayhu <alexander@alemayhu.com> 25 March 2017, 22:30:19 UTC
d1e538c doc: Refer to new vagrant box in vagrant guide Signed-off-by: Thomas Graf <thomas@cilium.io> 25 March 2017, 21:15:30 UTC
ec25f76 doc: Use readthedocs.io sphinx theme Signed-off-by: Thomas Graf <thomas@cilium.io> 25 March 2017, 21:15:30 UTC
cc5bb52 daemon: ignore running containers If some containers were created with a cilium instance and that cilium instance is stopped those containers should be kept with their network running as best effort. If a new cilium instance is started in the same machine, cilium could potentially allocate conflicting IP addresses used by the containers started by the previous cilium instance. This could cause conflicting endpoint IDs and at worst case, it could wrongly assign security IDs to the new containers with the conflicting IP addresses. With this commit, we check for running containers and add them to the list of ignored containers plus allocate their running containers. Reported-by: Dan Wendlandt <danwent@gmail.com> Signed-off-by: André Martins <andre@cilium.io> 25 March 2017, 21:14:47 UTC
d76fb42 bpf: Add empty install target Silences the following build warning: ==> cilium-master: make[1]: *** No rule to make target `install'. Stop. Signed-off-by: Thomas Graf <thomas@cilium.io> 25 March 2017, 21:14:09 UTC
1067a95 start.sh: always assign IPv4 NFS if IPv4=0 Signed-off-by: André Martins <andre@cilium.io> 25 March 2017, 20:34:58 UTC
8d33b07 Updated intro + gettignstarted 25 March 2017, 20:31:55 UTC
714dfc3 Convert documentation to use sphinx-doc Signed-off-by: Thomas Graf <thomas@cilium.io> 25 March 2017, 20:31:55 UTC
5675de9 labels: correct comment o s/IDNameHost/IDNameWorld Related-to: #153 (Resolve golint warnings) Signed-off-by: Alexander Alemayhu <alexander@alemayhu.com> 25 March 2017, 20:12:33 UTC
a110ffa Example: Use new tgraf/nettools container image Signed-off-by: Thomas Graf <thomas@cilium.io> 25 March 2017, 20:08:54 UTC
62f2f0f Vagrantfile: Use new vagrant box cilium/ubuntu-16.10 We have been using a vagrant box which included a custom kernel build based on the net-next kernel git repository tree. Since all required changes have been merged upstream we can start using official base images and just install a recent enough kernel (4.9.17) Signed-off-by: Thomas Graf <thomas@cilium.io> 25 March 2017, 20:08:54 UTC
b9afa89 packer: packer scripts have been moved to separate repositories Signed-off-by: Thomas Graf <thomas@cilium.io> 25 March 2017, 20:08:54 UTC
8671d7f README: Update prerequisites Fixes: #310 Signed-off-by: Thomas Graf <thomas@cilium.io> 25 March 2017, 20:08:54 UTC
2677c96 golint: fix warnings for pkg/labels/labels.go Fixes the following warnings Line 37: warning: exported const ID_NAME_ALL should have comment (or a comment on this block) or be unexported (golint) Line 42: warning: exported type LabelOpType should have comment or be unexported (golint) Line 46: warning: exported const AddLabelsOp should have comment (or a comment on this block) or be unexported (golint) Line 52: warning: exported type LabelOp should have comment or be unexported (golint) Line 54: warning: exported type OpLabels should have comment or be unexported (golint) Line 63: warning: exported method OpLabels.DeepCopy should have comment or be unexported (golint) Line 71: warning: exported method OpLabels.Enabled should have comment or be unexported (golint) Line 85: warning: exported function NewOplabelsFromModel should have comment or be unexported (golint) Line 97: warning: exported type LabelOwner should have comment or be unexported (golint) Line 198: warning: exported method Label.IsAllLabel should have comment or be unexported (golint) Line 203: warning: exported method Label.Matches should have comment or be unexported (golint) Line 314: warning: exported method Labels.DeepCopy should have comment or be unexported (golint) Line 327: warning: exported function NewLabelsFromModel should have comment or be unexported (golint) Line 337: warning: exported method Labels.GetModel should have comment or be unexported (golint) Line 455: warning: exported function ParseStringLabels should have comment or be unexported (golint) Line 465: warning: exported function LabelSliceSHA256Sum should have comment or be unexported (golint) Line 473: warning: exported function ParseStringLabelsInOrder should have comment or be unexported (golint) Related-to: #153 (Resolve golint warnings) Signed-off-by: Alexander Alemayhu <alexander@alemayhu.com> 25 March 2017, 15:39:48 UTC
a6330f6 contrib: use label instead of MAINTAINER The field has been deprecated[0]. [0]: https://docs.docker.com/engine/reference/builder/#maintainer-deprecated Signed-off-by: Alexander Alemayhu <alexander@alemayhu.com> 25 March 2017, 15:38:47 UTC
863aa31 demo: Fix API endpoint names of sw_demo Signed-off-by: Thomas Graf <thomas@cilium.io> 25 March 2017, 09:14:52 UTC
b73481a Makefile: Remove dependency of go-bindata Given the check-bindata target, depending on the the source files is pointless. Diffing the generated files is more secure. Signed-off-by: Thomas Graf <thomas@cilium.io> 25 March 2017, 00:56:53 UTC
bb6297a Initial proxy demo Signed-off-by: Thomas Graf <thomas@cilium.io> 25 March 2017, 00:56:53 UTC
1a74445 labels: Removed unused const values Signed-off-by: Thomas Graf <thomas@cilium.io> 25 March 2017, 00:56:53 UTC
7637545 Disable policy cache for now We need an individual proxy redirect for each endpoint. Needs to be changed so we can re-add policy caching. Signed-off-by: Thomas Graf <thomas@cilium.io> 25 March 2017, 00:56:53 UTC
770ad9c proxy: Initial transparent proxy support Transparent redirection of packets into a proxy in either user or kernel space. The configuration occurs through the L4 policy which can now redirect to an L4 port. An initial POC implementation of a proxy runs a separate go subroutine for each endpoint which requires redirection. It can receive metadata from the datapath via BPF maps. Signed-off-by: Thomas Graf <thomas@cilium.io> 25 March 2017, 00:56:53 UTC
d002319 vendor: Add vulcand dependencies Signed-off-by: Thomas Graf <thomas@cilium.io> 25 March 2017, 00:56:53 UTC
e5413aa golint: reduce cyclomatic complexity of loadPolicy Moved for loops into own functions. Fixes the following warning Line 154: warning: cyclomatic complexity 17 of function loadPolicy() is high (> 15) (gocyclo) Related-to: #153 (Resolve golint warnings) Signed-off-by: Alexander Alemayhu <alexander@alemayhu.com> 24 March 2017, 22:32:47 UTC
54d55ef README: add GoDoc link There is still a lot missing from the documentation, but what is there might be useful for someone wanting to read the code from a browser similar to lxr. Signed-off-by: Alexander Alemayhu <alexander@alemayhu.com> 24 March 2017, 22:32:27 UTC
a3418f5 golint: fix warnings for daemon/ct.go Fixes the following warnings daemon/ct.go:29:2: exported const GcInterval should have comment (or a comment on this block) or be unexported daemon/ct.go:61:1: exported method Daemon.EnableConntrackGC should have comment or be unexported Related-to: #153 (Resolve golint warnings) Signed-off-by: Alexander Alemayhu <alexander@alemayhu.com> 24 March 2017, 16:42:44 UTC
da2b031 cilium: update on go bindata due to change in raw_main Rerun of bindata to include the map->type fix. Signed-off-by: Daniel Borkmann <daniel@cilium.io> 24 March 2017, 16:37:52 UTC
6868d47 bpf: don't assume hash map in raw_main From initial testing I always had BPF_MAP_TYPE_HASH, but since we need to test for different map types, use map->type as it was intended. Signed-off-by: Daniel Borkmann <daniel@cilium.io> 24 March 2017, 16:37:52 UTC
d3d1e88 ipam: remove {CNI,Libnetwork}IPAMType Only CNIIPAMType was in use at one call site. Inline a value instead. Suggested-by: André Martins <andre@cilium.io> Signed-off-by: Alexander Alemayhu <alexander@alemayhu.com> 24 March 2017, 04:05:04 UTC
b5c79d8 golint: reduce comment warnings Fixes all the warnings with the following pattern ... comment on exported function xYZ should be of the form "xYZ ..." Related-to: #153 (Resolve golint warnings) Signed-off-by: Alexander Alemayhu <alexander@alemayhu.com> 24 March 2017, 04:05:04 UTC
5b1dbd7 cilium: regenerate go bindata due to changes in bpf code Since we've updated the probes and bpf_lxc, we had to regenerate go bindata in here. Separate commit to reduce noise. Signed-off-by: Daniel Borkmann <daniel@cilium.io> 24 March 2017, 01:28:57 UTC
f50d1b6 bpf: lb test, also use bombardier for testing http Two things: fix LIB path as otherwise we cannot compile bpf_lb.o, and add also http tests with bombardier. Right now IPv6 tests look all fine and IPv4 tests Signed-off-by: Daniel Borkmann <daniel@cilium.io> 24 March 2017, 01:28:57 UTC
c9325f1 bpf: raw_mark_map_val needs at least 4.9.17 kernel Since related commits have landed in stable now [1], we can relax the requirement of 4.10+ to 4.9.17+ kernels. [1] http://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1359777.html Signed-off-by: Daniel Borkmann <daniel@cilium.io> 24 March 2017, 01:28:57 UTC
993b983 bpf: move v4/v6 ct tables to lru map Add a probe whether BPF LRU map is available and if so then use the LRU-based hash table map instead of the traditional hash table. It uses a global lru list, not the strictly per-cpu one to save memory cost. As a side-effect, when using lru, we disable the gc in the go daemon and can just reuse stale entries. Also, update bpf/bpf_features.h so we can build test locally. Signed-off-by: Daniel Borkmann <daniel@cilium.io> 24 March 2017, 01:28:57 UTC
97e2e0a bpf: various ab test tweaks in 06-lb.sh Comment out the ping6 since that doesn't work yet. Add tests with HTTP KeepAlive (-k) and without. Continue when a socket error has occured (-r) f.e. on timeout, etc. Add a fixed number of -n 1000000 requests and vary concurrency. Signed-off-by: Daniel Borkmann <daniel@cilium.io> 24 March 2017, 01:28:57 UTC
724c776 bpf: sync bpf.h uapi header with upstream kernel It's needed for the test case of LRU map, so that compilation doesn't fail for the probe and later on BPF bits. Signed-off-by: Daniel Borkmann <daniel@cilium.io> 24 March 2017, 01:28:57 UTC
9a68022 Vagrantfile: Bump memory to 3G I'm frequently seeing the following errors when running out of memory with vagrant: ==> cilium-master: # github.com/cilium/cilium/daemon ==> cilium-master: /usr/local/go/pkg/tool/linux_amd64/link: running gcc failed: fork/exec /usr/bin/gcc: cannot allocate memory Signed-off-by: Thomas Graf <thomas@cilium.io> 23 March 2017, 20:34:09 UTC
759fd15 demo: Update demos to new defaults Some commands have been renamed and policy enforcement has been turned off by default with a default on on policy load Signed-off-by: Thomas Graf <thomas@cilium.io> 23 March 2017, 20:30:16 UTC
52ef4ec demo2: Enable policy enforcement Given that policy enforcement is disabled by default if no policy has been loaded, we need to enable policy enforcement. Signed-off-by: Thomas Graf <thomas@cilium.io> 23 March 2017, 20:30:16 UTC
8e49c90 demo/tests: Update location of netperf and nettools docker images Signed-off-by: Thomas Graf <thomas@cilium.io> 23 March 2017, 20:30:16 UTC
a296a0e golint: fix warnings for common/const.go Fixes the following warnings Line 42: warning: comment on exported const ServicesKeyPath should be of the form "ServicesKeyPath ..." (golint) Line 71: warning: comment on exported const K8sEnvNodeNameSpec should be of the form "K8sEnvNodeNameSpec ..." (golint) Line 73: warning: comment on exported const ReservedLabelSource should be of the form "ReservedLabelSource ..." (golint) Line 75: warning: comment on exported const ReservedLabelKey should be of the form "ReservedLabelKey ..." (golint) Line 88: warning: comment on exported const NetdevHeaderFileName should be of the form "NetdevHeaderFileName ..." (golint) Related-to: #153 (Resolve golint warnings) Signed-off-by: Alexander Alemayhu <alexander@alemayhu.com> 23 March 2017, 19:26:50 UTC
542198d golint: fix warnings for common/addressing/defaults.go Fixes the following warnings Line 22: warning: comment on exported const DefaultIPv6Prefix should be of the form "DefaultIPv6Prefix ..." (golint) Line 24: warning: comment on exported const DefaultIPv6PrefixLen should be of the form "DefaultIPv6PrefixLen ..." (golint) Line 26: warning: comment on exported const DefaultIPv4Prefix should be of the form "DefaultIPv4Prefix ..." (golint) Line 29: warning: comment on exported const DefaultIPv4PrefixLen should be of the form "DefaultIPv4PrefixLen ..." (golint) Line 31: warning: comment on exported const DefaultIPv4ClusterPrefixLen should be of the form "DefaultIPv4ClusterPrefixLen ..." (golint) Line 33: warning: comment on exported const DefaultNAT46Prefix should be of the form "DefaultNAT46Prefix ..." (golint) Line 52: warning: comment on exported var ContainerIPv6Mask should be of the form "ContainerIPv6Mask ..." (golint) Line 55: warning: comment on exported var ContainerIPv4Mask should be of the form "ContainerIPv4Mask ..." (golint) Line 59: warning: exported var IPv6DefaultRoute should have comment or be unexported (golint) Related-to: #153 (Resolve golint warnings) Signed-off-by: Alexander Alemayhu <alexander@alemayhu.com> 23 March 2017, 18:25:03 UTC
a4aac42 Set Jenkins timeout to 30 minutes Abort the Jenkins build if it takes more than 30 minutes. Signed-off-by: Michi Mutsuzaki <michi@covalent.io> 23 March 2017, 18:24:41 UTC
f697b0c bpf: map: Add new map-in-map types introduced upstream Add the new map types MapTypeArrayOfMaps and MapTypeHashOfMaps to match BPF_MAP_TYPE_ARRAY_OF_MAPS and BPF_MAP_TYPE_HASH_OF_MAPS. They were introduced in the net-next tree in commits 56f668dfe00d ("bpf: Add array of maps support") and bcc6b1b7ebf8 ("bpf: Add hash of maps support"), respectively. Signed-off-by: Tobias Klauser <tklauser@distanz.ch> 23 March 2017, 13:52:12 UTC
back to top