Documentation
¶
Index ¶
Constants ¶
View Source
const (
// AutoCIDR indicates that a CIDR should be allocated
AutoCIDR = "auto"
)
Variables ¶
View Source
var ( Agent = cell.Module( "agent", "Cilium Agent", Infrastructure, ControlPlane, datapath.Cell, ) // Infrastructure provides access and services to the outside. // A cell should live here instead of ControlPlane if it is not needed by // integrations tests, or needs to be mocked. Infrastructure = cell.Module( "infra", "Infrastructure", pprof.Cell(pprofConfig), gops.Cell(defaults.EnableGops, defaults.GopsPortAgent), k8sClient.Cell, dial.ServiceResolverCell, cell.Provide(kvstoreExtraOptions), kvstore.Cell(kvstore.DisabledBackendName), cell.Invoke(kvstoreLocksGC), cni.Cell, metrics.AgentCell, metricsmap.Cell, ratelimitmap.Cell, cell.Provide(func() *option.DaemonConfig { return option.Config }), server.Cell, cell.Invoke(configureAPIServer), store.Cell, cell.Provide(func() k8sSynced.CRDSyncResourceNames { return k8sSynced.AgentCRDResourceNames() }), k8sSynced.CRDSyncCell, shell.Cell, healthz.Cell, ) // ControlPlane implement the per-node control functions. These are pure // business logic and depend on datapath or infrastructure to perform // actions. This separation enables non-privileged integration testing of // the control-plane. ControlPlane = cell.Module( "controlplane", "Control Plane", node.LocalNodeStoreCell, cell.Provide(newLocalNodeSynchronizer), controller.Cell, agentK8s.ResourcesCell, agentK8s.TablesCell, k8sSynced.Cell, endpoint.Cell, nodeManager.Cell, neighbordiscovery.Cell, certificatemanager.Cell, server.SpecCell, healthApi.SpecCell, daemonCell, maglev.Cell, loadbalancer_cell.Cell, proxy.Cell, envoy.Cell, ciliumenvoyconfig.Cell, restapi.Cell, bgpv1.Cell, signal.Cell, auth.Cell, identity.Cell, ipcache.Cell, ipamcell.Cell, egressgateway.Cell, kpr.Cell, policy.Cell, policyK8s.Cell, policyDirectory.Cell, cell.Config(cmtypes.DefaultClusterInfo), cell.Config(cmtypes.DefaultPolicyConfig), clustermesh.Cell, l2announcer.Cell, nodediscovery.Cell, cgroup.Cell, natStats.Cell, cell.Provide(func() watchers.ResourceGroupFunc { return allResourceGroups }), watchers.Cell, recorder.Cell, dynamicconfig.Cell, dynamiclifecycle.Cell, driftchecker.Cell, hubble.Cell, features.Cell, source.Cell, fqdn.Cell, health.Cell, status.Cell, debugapi.Cell, ) )
Functions ¶
func InitGlobalFlags ¶
func NewDaemonCleanup ¶
func NewDaemonCleanup() *daemonCleanup
Types ¶
type Daemon ¶
type Daemon struct {
// contains filtered or unexported fields
}
Daemon is the cilium daemon that is in charge of perform all necessary plumbing, monitoring when a LXC starts.
func (*Daemon) WaitForEndpointRestore ¶ added in v1.15.0
type EndpointMapManager ¶
type EndpointMapManager struct {
endpointmanager.EndpointManager
// contains filtered or unexported fields
}
EndpointMapManager is a wrapper around an endpointmanager as well as the filesystem for removing maps related to endpoints from the filesystem.
func (*EndpointMapManager) ListMapsDir ¶ added in v1.17.7
func (e *EndpointMapManager) ListMapsDir(path string) []string
ListMapsDir gives names of files (or subdirectories) found in the specified path.
func (*EndpointMapManager) RemoveDatapathMapping ¶
func (e *EndpointMapManager) RemoveDatapathMapping(endpointID uint16) error
RemoveDatapathMapping unlinks the endpointID from the global policy map, preventing packets that arrive on this node from being forwarded to the endpoint that used to exist with the specified ID.
func (*EndpointMapManager) RemoveMapPath ¶
func (e *EndpointMapManager) RemoveMapPath(path string)
RemoveMapPath removes the specified path from the filesystem.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.