mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-04 04:08:16 +00:00 
			
		
		
		
	Ginkgo v2.18.0 allows tweaking the output so that it's easier to follow while a job runs in Prow (https://github.com/onsi/ginkgo/issues/1347). Using this in hack/ginkgo-e2e.sh will follow in a separate commit. Gomega gets bumped to the latest release to keep it up-to-date. Ginkgo v1.19.0 adds support for --label-filter with labels that represent sets (like our Feature:<Foo>).
		
			
				
	
	
		
			59 lines
		
	
	
		
			1.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			59 lines
		
	
	
		
			1.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2024 The Go Authors. All rights reserved.
 | 
						|
// Use of this source code is governed by a BSD-style
 | 
						|
// license that can be found in the LICENSE file.
 | 
						|
 | 
						|
// Socket control messages
 | 
						|
 | 
						|
package unix
 | 
						|
 | 
						|
import "unsafe"
 | 
						|
 | 
						|
// UnixCredentials encodes credentials into a socket control message
 | 
						|
// for sending to another process. This can be used for
 | 
						|
// authentication.
 | 
						|
func UnixCredentials(ucred *Ucred) []byte {
 | 
						|
	b := make([]byte, CmsgSpace(SizeofUcred))
 | 
						|
	h := (*Cmsghdr)(unsafe.Pointer(&b[0]))
 | 
						|
	h.Level = SOL_SOCKET
 | 
						|
	h.Type = SCM_CREDENTIALS
 | 
						|
	h.SetLen(CmsgLen(SizeofUcred))
 | 
						|
	*(*Ucred)(h.data(0)) = *ucred
 | 
						|
	return b
 | 
						|
}
 | 
						|
 | 
						|
// ParseUnixCredentials decodes a socket control message that contains
 | 
						|
// credentials in a Ucred structure. To receive such a message, the
 | 
						|
// SO_PASSCRED option must be enabled on the socket.
 | 
						|
func ParseUnixCredentials(m *SocketControlMessage) (*Ucred, error) {
 | 
						|
	if m.Header.Level != SOL_SOCKET {
 | 
						|
		return nil, EINVAL
 | 
						|
	}
 | 
						|
	if m.Header.Type != SCM_CREDENTIALS {
 | 
						|
		return nil, EINVAL
 | 
						|
	}
 | 
						|
	ucred := *(*Ucred)(unsafe.Pointer(&m.Data[0]))
 | 
						|
	return &ucred, nil
 | 
						|
}
 | 
						|
 | 
						|
// PktInfo4 encodes Inet4Pktinfo into a socket control message of type IP_PKTINFO.
 | 
						|
func PktInfo4(info *Inet4Pktinfo) []byte {
 | 
						|
	b := make([]byte, CmsgSpace(SizeofInet4Pktinfo))
 | 
						|
	h := (*Cmsghdr)(unsafe.Pointer(&b[0]))
 | 
						|
	h.Level = SOL_IP
 | 
						|
	h.Type = IP_PKTINFO
 | 
						|
	h.SetLen(CmsgLen(SizeofInet4Pktinfo))
 | 
						|
	*(*Inet4Pktinfo)(h.data(0)) = *info
 | 
						|
	return b
 | 
						|
}
 | 
						|
 | 
						|
// PktInfo6 encodes Inet6Pktinfo into a socket control message of type IPV6_PKTINFO.
 | 
						|
func PktInfo6(info *Inet6Pktinfo) []byte {
 | 
						|
	b := make([]byte, CmsgSpace(SizeofInet6Pktinfo))
 | 
						|
	h := (*Cmsghdr)(unsafe.Pointer(&b[0]))
 | 
						|
	h.Level = SOL_IPV6
 | 
						|
	h.Type = IPV6_PKTINFO
 | 
						|
	h.SetLen(CmsgLen(SizeofInet6Pktinfo))
 | 
						|
	*(*Inet6Pktinfo)(h.data(0)) = *info
 | 
						|
	return b
 | 
						|
}
 |